US20150215334A1 - Systems and methods for generating network threat intelligence - Google Patents

Systems and methods for generating network threat intelligence Download PDF

Info

Publication number
US20150215334A1
US20150215334A1 US14/683,964 US201514683964A US2015215334A1 US 20150215334 A1 US20150215334 A1 US 20150215334A1 US 201514683964 A US201514683964 A US 201514683964A US 2015215334 A1 US2015215334 A1 US 2015215334A1
Authority
US
United States
Prior art keywords
network
internet protocol
protocol address
threat
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/683,964
Inventor
Skyler J. Bingham
Mahendra K. Chandrakar
Lawrence W. Gowin
Ryan T. Korte
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Level 3 Communications LLC
Original Assignee
Level 3 Communications LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/039,251 external-priority patent/US10129270B2/en
Application filed by Level 3 Communications LLC filed Critical Level 3 Communications LLC
Priority to US14/683,964 priority Critical patent/US20150215334A1/en
Assigned to LEVEL 3 COMMUNICATIONS, LLC reassignment LEVEL 3 COMMUNICATIONS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BINGHAM, SKYLER J., CHANDRAKAR, MAHENDRA K., GOWIN, LAWRENCE W., KORTE, RYAN T.
Publication of US20150215334A1 publication Critical patent/US20150215334A1/en
Priority to CA2982107A priority patent/CA2982107A1/en
Priority to EP16777161.7A priority patent/EP3281116A4/en
Priority to PCT/US2016/026131 priority patent/WO2016164403A1/en
Priority to HK18108921.7A priority patent/HK1249603A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • G06N99/005
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning

Definitions

  • aspects of the present disclosure relate to network security data collection, aggregation, and analysis, among other functions, and more particularly to the generation of network threat intelligence, including reputation scores and profiles, based on network security data.
  • Computing devices including laptops and smartphones, connected to the Internet or other networks are generally confronted by interminable security risks.
  • the Internet is plagued by numerous malicious actors utilizing various forms of malware to damage or disable computing devices or systems, steal data, interrupt communications, extort businesses or individuals, and/or steal money, among other nefarious acts.
  • malware e.g., a virus, a virus, a virus, or a virus, or a virus.
  • the malicious actors are constantly deploying new malware as defensive technologies are designed to address them. End users are therefore vulnerable until protection against an exploit is developed.
  • IP Internet Protocol
  • Implementations described and claimed herein address the foregoing problems, among others, by providing systems and methods for generating network threat intelligence based on network security data.
  • a network traffic dataset representative of network traffic for an Internet Protocol address across one or more ports of a primary network is obtained.
  • the primary network is in communication with a content distribution network, and the Internet Protocol address corresponds to a computing device.
  • a content distribution network log associated with the content distribution network is obtained.
  • the content distribution network log includes a history of content requests by the Internet Protocol address.
  • the network traffic dataset is correlated with the content distribution network log based on the Internet Protocol address to obtain network security data.
  • One or more threat attributes representative of malicious activity are identified from the network security data.
  • the one or more threat attributes are weighted.
  • Network threat intelligence is generated based on the weighted threat attributes using a processing cluster.
  • FIG. 1 shows an example system for generating network threat intelligence based on network security data.
  • FIG. 2 illustrates an example network environment for monitoring and correlating network traffic data.
  • FIG. 3 shows an example network environment for obtaining a content distribution network log and a domain name system log.
  • FIG. 4 illustrates example operations for generating a reputation score for an IP address based on network security data.
  • FIG. 5 is an example computing system that may implement various systems and methods discussed herein.
  • the network security data is collected, and may include a network traffic dataset, a Content Distribution Network (CDN) log, and a Domain Name System (DNS) log, among other types of data.
  • CDN Content Distribution Network
  • DNS Domain Name System
  • a primary network such as a large Internet Service Provider (ISP) or backbone provider, is uniquely positioned to capture and analyze the network security data.
  • the network traffic dataset is obtained through the monitoring and correlation of network traffic over one or more ports in the primary network. Stated differently, network traffic data and statistics are gathered from the interaction of the primary network with one or more secondary networks and customer networks and correlated to form a network traffic dataset.
  • the secondary networks may include networks beyond networks adjacent to the primary network.
  • the network traffic dataset provides snapshots of traffic transceived across the primary network, from which network traffic patterns for at least one Internet Protocol (IP) address are obtained.
  • IP Internet Protocol
  • the network traffic patterns may reveal a pattern of network traffic exchanged between an IP address known to engage in malicious activity and other IP addresses, thereby indicating that the other IP addresses are participating in or otherwise susceptible to an attack.
  • the type of data traversing the primary network and information regarding computing devices associated with the IP addresses exchanging network traffic cannot be directly discerned from the network traffic dataset.
  • the network traffic dataset is correlated with the CDN log, among other types of data, to gain further insight into malicious activity and potential responses to thwart and prevent attacks.
  • the CDN log and other types of data are obtained based on the interaction of IP addresses with a CDN.
  • a CDN is a distributed system of servers deployed across a network to serve content with high performance and availability to IP addresses associated with end users.
  • Content served via a CDN may include web objects (e.g., text, graphics, or scripts), downloadable objects (e.g., media files, software, or documents), applications (e.g., e-commerce or portals), streaming media (e.g., live or on-demand), social networks, and the like.
  • Content providers such as media companies or vendors, may contract with CDN operators to serve their content to their end users, and a CDN may utilize the primary network or other carriers or networks to host its servers.
  • An end user may request content on a user device connected to a CDN via a customer network. For example, a user may wish to stream a movie on a computer or any other number of possible user devices, as described herein.
  • a link to the movie in a website or other interface may be selected.
  • the user may select a graphic of the movie, and that graphic is associated with the link that begins the process of obtaining the movie data from the CDN.
  • Selection of the link in some form causes a request to be sent to a directory server providing a DNS service in the CDN.
  • the directory server responds to the request by providing a network address (e.g., an IP address) from which the movie may be retrieved.
  • a network address e.g., an IP address
  • the CDN log includes a history of such content requests from and deliveries to various IP addresses
  • the DNS log includes a history of network addresses to which various IP addresses were resolved in response to the selection or input of a link (e.g., a Uniform Resource Locator (URL) or other identifier).
  • a link e.g., a Uniform Resource Locator (URL) or other identifier.
  • the network traffic dataset enhanced with the CDN log and the DNS log provides hard data about an IP address and attributes of the IP address.
  • the network security data is correlated and parsed to determine a user agent, device type, content type, and other attributes corresponding to the IP address.
  • Threat attributes are identified based on the network security data.
  • the threat attributes supply a behavior profile of the IP address with the various activities of the IP address over a time frame.
  • Each of the threat attributes are weighted based on the type of activity, the source, and other factors, established, for example, via machine learning.
  • network threat intelligence including a reputation score
  • the reputation score represents a confidence level in a likelihood of whether an IP address engages in or is otherwise susceptible to malicious activity. The higher the score, the higher the confidence that the IP address engages in or is otherwise susceptible to malicious activity
  • a neighborhood score for an internet neighborhood of the IP address is generated, where the internet neighborhood represents a collection of IP addresses related to the IP address at issue.
  • the internet neighborhood may be a netblock (i.e., a set of grouped IP addresses having a start IP address and an end IP address), an autonomous system (AS), a region, a country, and/or other collections of IP addresses related to the IP address at issue.
  • the neighborhood score provides a reputation score for an internet neighborhood based on weighted threat attributes identified from network security data corresponding to network traffic involving the internet neighborhood.
  • the neighborhood scores demonstrate whether the IP address is sending network traffic associated with malicious activity or simply in an internet neighborhood where such network traffic is frequently exchanged. For example, the IP address may be within a range of IP addresses assigned to a country that frequently participates in network attacks, but the IP address may not be engaged in such attacks.
  • the neighborhood scores in this case may indicate that the reputation score of the IP address is higher than it should be as a result of the activity of the country.
  • the IP address may be associated with a country lacking access to security updates and thus be more susceptible to malware and to infecting other devices, but the computing device associated with IP address may have nonetheless been able to obtain sufficient security updates.
  • the neighborhood score for the country would be higher based on this susceptibility, which may be erroneously attributed to all the IP addresses within that country. Evaluating the reputation score for the IP address in view of the neighborhood score here would reveal that the reputation score for the IP address may be inflated based on the association of the IP address with the shortcomings of the country.
  • a normalized reputation score for the IP address is thus generated based on the aggregated neighborhood scores for the internet neighborhoods and the reputation score for the IP address. Based on the normalized reputation score for the IP address, the primary network and/or the secondary network, such as a CDN, may respond to a threat by the IP address.
  • FIG. 1 an example system 100 for generating network threat intelligence based on network security data 102 is shown.
  • a processing cluster 104 regularly gathers the security data 102 from a variety of trusted sources having information relating to the activity of IP addresses.
  • a primary network such as a large ISP or backbone provider, includes edge devices, servers, and other network components uniquely positioned to capture the security data 102 .
  • the processing cluster 104 is configured to retrieve a network traffic dataset 106 providing information about IP addresses known to host malicious activity.
  • the network traffic dataset 106 is obtained through the monitoring and correlation of network traffic over one or more ports in the primary network, for example, as described with respect to FIG. 2 .
  • the network traffic dataset 106 may be used to identify a gross level of potential malicious actors based on the IP addresses between which traffic is exchanged via the primary network.
  • the network traffic dataset 106 may reveal traffic patterns indicative of a host IP address for a command and control server for a botnet, which is a collection of network-connected programs communicating with other similar programs in order to perform tasks, such as spam email, distributed denial-of-service attacks, or other malicious activity.
  • any IP addresses exchanging traffic with the host IP address are likely bots engaging in the malicious activity.
  • the network traffic dataset 106 thus identifies IP addresses associated with malicious activity.
  • the network traffic dataset 106 may be enhanced with a CDN log 108 , and a DNS log 110 to provide insight into the type of data traversing the primary network as well as attributes of the IP address, including characteristics of the computing device associated with the IP address.
  • the CDN log 108 includes a history of content requests from and deliveries to various IP addresses
  • the DNS log 110 includes a history of network addresses to which various IP addresses were resolved in response to the selection or input of a link (e.g., a URL or other identifier).
  • the CDN log 108 and the DNS log 110 may be obtained, for example, as described with respect to FIG. 3 and retrieved by the processing cluster 104 .
  • the CDN log 108 includes an Application Layer Routing (ALR) log, which details the IP address, URL request, and user agent (e.g., type of computing device, operating system type and version running on the computing device, other software running on the computing device, etc.), as well as the content requested.
  • ALR Application Layer Routing
  • the CDN log 108 obtains the user agent from a header included in requests and other communications sent by the computing device and tied to the IP address, which is verified by confirming the extender line (i.e., bidirectional communication between the IP address and the CDN) using Transmission Control Protocol (TCP).
  • TCP Transmission Control Protocol
  • the CDN log 108 thus provides information regarding content requested from a CDN and information regarding the computing device requesting the content.
  • the network traffic dataset 106 enhanced with the CDN log 108 provides granular information regarding the malicious activity associated with the IP address.
  • the CDN log 108 includes information about the particular malware deployed from the IP address, including the operating system and software used to design the malware and the operating systems targeted by the malware. Knowing the operating system and other software used to design and deploy malware, as well as the operating systems and computing device types targeted by the malware, assists in identifying and remedying vulnerabilities in the operating systems exploited by the malware and in determining targets susceptible to the malware. This information further provides insight into how malicious actors behave and what they target, thereby informing the development of new or improved security tool. Similarly, knowing the content requested by the IP address deploying the malware may provide information on potential targets. For example, an IP address engaged in malicious activity that frequents healthcare websites may evidence a potential or current threat targeting the healthcare industry.
  • the security data 102 generally provides a landscape of network threats with granular detail.
  • the network traffic dataset 106 associates an IP address to malicious activity based on the exchange of traffic with IP addresses known to engage in or be vulnerable to such activity.
  • the CDN log 108 provides insight into the type of device associated with the IP address, what software and operating systems are running on the device, and what content is being requested. The requested content may suggest targets for malicious activity. For example, if an IP address associated with malicious activity frequents healthcare sites, the IP address may be targeting actors within the healthcare industry.
  • the DNS log 110 may be used, as described with respect to FIGS. 2-3 to pin the IP address to a particular geographical location. The geographical location of an IP address may inform a threat level based on the vulnerability or malicious activity in the geographical location.
  • a netblock, AS, or country may lack access to security updates and thus be more susceptible to malware and to infecting other devices.
  • the security data 102 thus provides tangible information, rather than mere statistical inference, regarding an IP address and attributes of the IP address, such as location, user agent, requested content, and the like.
  • Other data 112 may be provided to the processing cluster 104 to provide additional granularity regarding the attributes of the IP addresses.
  • the other data 112 may include one or more enrichment feeds having data that: may be correlated with the end users (i.e., with the IP addresses); relates to one or more networks in communication with the primary network (e.g., secondary or customer networks); and/or otherwise enhances the security data 102 .
  • the other data 112 includes data from electrically accessible sources relating to the activities of IP addresses and domains.
  • honeypots i.e., a computer, data, or network site appearing as part of a network but is actually isolated and monitored to investigate malicious activity
  • Open Source Intelligence (OSI) databases trusted partner databases
  • intrusion detection system alerts spam origins, abuse complaints, and the like.
  • the processing cluster 104 communicates with and retrieves the security data 102 and/or the other data 112 at regularly scheduled intervals. In another implementation, the processing cluster 104 receives the security data 102 and/or the other data 112 in substantially real time. In still another implementation, the processing cluster 104 retrieves the security data 102 and/or the other data 112 in response to a manual command.
  • the processing cluster 104 may receive data over a network (e.g., the Internet, an enterprise intranet, etc.), via an Application Programming Interface (API) for a source, and/or the like.
  • API Application Programming Interface
  • the processing cluster 104 is configured to parse, tag, and/or associate data elements for storage and analysis.
  • the processing cluster 104 may include various modules, components, systems, infrastructures, and/or applications that may be combined in various ways, including into a single software application or multiple software applications.
  • the security data 102 and the other data 112 provided to the processing cluster 104 is stored in one or more non-relational databases 122 , in one specific implementation.
  • the processing cluster 104 is a distributed, scalable storage layer that is configured to store a large volume of structured and unstructured data. In one implementation, the processing cluster 104 replicates and distributes blocks of data through cluster nodes, along with numerous other features and advantages. As such, the processing cluster 104 generally manages the processing, storage, analysis, and retrieval of large volumes of data in the non-relational database 122 .
  • the processing cluster 104 may include, for example, Storm, Hadoop®, or the like.
  • the security data 102 and/or the other data 112 is received at one or more router interfaces, which is running an agent, such as Flume or other aggregation modules.
  • the agent extracts, ingests, and imports the security data 102 and/or the other data 112 into the processing cluster 104 , where the security data 102 and/or the other data 112 is transformed, aggregated, parsed, and assigned relevancy values and locations for storage in the database 122 .
  • the security data 102 and/or the other data 112 is timestamped using a messaging bus, which may be, for example, Apache Kafka, zeromq, or the like.
  • the processing cluster 104 serializes and stores the security data 102 and/or the other data 112 , such that network threat intelligence 114 may be generated based on a query.
  • the processing cluster 104 processes a query in multiple parts at the cluster node level and aggregates the results to generate the network threat intelligence 114 .
  • the processing cluster 104 receives a query in structured query language (SQL), aggregates data stored in the database 122 , and outputs the threat intelligence 114 in a format enabling further management, analysis, and/or merging with other data sources.
  • SQL structured query language
  • the processing cluster 104 filters and packages the data into a uniform record format for storage in the database 122 . During filtering, any irrelevant information, including misinformed information, is removed. The filtered data is then normalized into a standard format and aggregated based on IP address into a record with duplicate records removed.
  • the processing cluster 104 assigns relevancy values to the records based on the data in the record and/or information retrieved from an internal or external source. The relevancy values may involve the IP address, the computing device, and the user agent.
  • the processing cluster 104 utilizes the relevancy values in generating the threat intelligence 114 in response to a query.
  • the processing cluster 104 may generate the threat intelligence 114 using machine learning techniques deployed with a machine learning system 124 .
  • the machine learning techniques provided by the machine learning system 124 generally involve a machine learning through observing data that represents incomplete information about statistical happenings and generalizing such data to rules and/or algorithms that make predictions for future data, trends, and the like.
  • Machine learning typically includes “classification” where machines learn to automatically recognize complex patterns and make intelligent predictions for a class.
  • the threat intelligence 114 identifies IP addresses associated with malicious actors and differentiates such actors from legitimate end users.
  • the threat intelligence 114 involves a correlation of IP addresses, user agents, geographical locations, and content requests.
  • the threat intelligence 114 may include a reputation score 116 , a reputation profile 118 , and threat analytics 120 . Based on the threat intelligence 114 , a response to threats by a particular IP address may be determined.
  • the reputation score 116 involves weighting threat attributes of the security data 102 to identify and/or predict the presence of malicious activity.
  • the processing cluster 104 assigns a weight to each threat attribute in a record that corresponds to a nature of the associated threat, including a type of activity and a source of data indicating the activity. For example, a low weight may be assigned to threat attributes related to port 80 (i.e., the default port for insecure Internet connection) because it is common to have traffic on port 80 . Conversely, a higher weight may be assigned to threat attributes related to other ports with lower traffic activity because any traffic on through such ports is rare, which may be indicative of malicious activity. Similarly, sending spam may receive a lower weight than participation in a botnet.
  • the machine learning system 124 assigns a weight or dynamically readjusts a weight for threat attributes. For example, the machine learning system 124 may track future activity and effects of that activity compared to the assigned weights for that activity to dynamically adjust weights for similar activity.
  • the processing cluster 104 parses the weighted threat attributes and uses the parsed weighted threat attributes to generate a baseline reputation score for each IP address.
  • the reputation score 116 is a single value (e.g., a percentage) representing a confidence level in a likelihood of whether an IP address engages in or is otherwise susceptible to malicious activity. The higher the reputation score 116 the higher the confidence that the IP address engages in or is otherwise susceptible to malicious activity. Where there is a prevalence of IP addresses engaged in malicious activity concentrated in one network area associated with an IP address, the activity of that area may erroneously implicate the IP address, resulting in an inflated reputation score 116 for the IP address. To ensure that an IP address is not assigned a reputation score 116 that is inherited based upon the activities of other users, a neighborhood score for an internet neighborhood of the IP address is generated. The internet neighborhood represents a collection of IP addresses related to the IP address at issue and may be a netblock, an AS, a region, a country, and/or other collections of IP addresses.
  • the neighborhood score provides a reputation score for an internet neighborhood based on weighted threat attributes identified from the network security data 102 corresponding to the internet neighborhood. Specifically, threat attributes are identified from the network security data 102 based on the various activities of the IP addresses within the internet neighborhood over a time frame, thereby supplying a behavior profile of the internet neighborhood. Each of the threat attributes are weighted based on the type of activity, the reporting source, and other factors, established, for example, via machine learning, as described herein with respect to the reputation score 116 . Based on the weighted threat attributes, the neighborhood score for the internet neighborhood is generated.
  • the neighborhood scores demonstrate whether the IP address is sending network traffic associated with malicious activity or simply in an internet neighborhood where such network traffic is frequently exchanged.
  • the IP address may be within a range of IP addresses assigned to a country that frequently participates in network attacks, but the IP address may not be engaged in such attacks.
  • the neighborhood scores in this case may indicate that the reputation score 116 of the IP address is higher than it should be as a result of the activity of the country.
  • the IP address may be associated with a country lacking access to security updates and thus be more susceptible to malware and to infecting other devices, but the computing device associated with IP address may have nonetheless been able to obtain sufficient security updates.
  • the neighborhood score for the country would be higher based on this susceptibility, which may be erroneously attributed to all the IP addresses within that country. Evaluating the reputation score 116 for the IP address in view of the neighborhood score here would reveal that the reputation score 116 for the IP address may be erroneously inflated based on the association of the IP address with the shortcomings of the country.
  • the processing cluster 104 thus generates a neighborhood score for each of the internet neighborhoods of the IP address and normalizes the reputation score 116 based on the neighborhood scores for the internet neighborhoods.
  • the reputation score 116 is a normalized reputation score for the IP address taking into account the activity of the IP address and the activity of other uses that may be influencing a perceived threat level of the IP address.
  • the processing cluster 104 regularly updates the reputation score 116 based on current activity by the associated IP address as the security data 102 is regularly collected, parsed, and analyzed.
  • the processing cluster 104 and/or the machine learning system 124 evaluates the reputation score 116 to generate the reputation profile 118 , which provides detail regarding the weighted threat attributes and/or the basis of the reputation score, including activity of the IP address demonstrating that the IP address is engaging in or vulnerable to malicious activity. For example, a computing device operating at an IP address with no firewall, open ports, and/or outdated software may not be actively or intentionally engaging in malicious activity. However, given the vulnerability of the computing device to malware, the IP address may receive a higher reputation score 116 .
  • a user may query the processing cluster 104 to obtain the reputation score 116 and/or the reputation profile 118 for one or more IP addresses to facilitate responding to network threats without limiting the network activity of legitimate end users.
  • the reputation score 116 and/or the reputation profile 118 may be replicated to memory caches in edge servers, so the user experiences reduced latency when querying the processing cluster 104 .
  • the reputation score 116 may be used to determine a source of a current attack and respond accordingly.
  • a high reputation score 116 represents a high confidence that the IP address is engaged in malicious behavior and thus may merit a relatively strong response, such as dropping the traffic emanating from the IP address at the network edge.
  • the reputation score 116 thus informs traffic filtering during an attack, so network traffic from those IP addresses likely to be participating in the attack may be dropped without denying service to those likely to be legitimate users.
  • the threat analytics 120 may include trends in network threats, maps providing visual representations of network threats or trends, predictions of future activity, proposed responses to threats, effectiveness of responses to threats, and the like.
  • the trends in network threats may provide insight into changes in malicious activities and the relationship of such activities to attributes of IP addresses.
  • the trends may indicate an increase in the occurrence of malware targeting Windows® operating systems.
  • the threat analytics 120 include a map correlating geographical regions to the reputation score 116 of IP addresses within those regions.
  • the threat analytics 120 include a map correlating device type, operating system, software, and/or the like with market and the reputation score 116 of the IP addresses within the market.
  • the map may reveal a particular country with a high reputation score 116 due to a high occurrence of computing devices running Windows® susceptible to malicious activity in the country based on a lack of access to Windows® security updates.
  • the threat analytics 120 inform a determination of a threshold for filtering network traffic or otherwise responding to malicious activity based on the reputation score 116 .
  • a threshold e.g. 50%
  • the threshold may be set based on various factors, including, without limitation, business practices, vulnerability to malicious activities, factors established using the machine learning system 124 , customer feedback, and the like.
  • the business practices of a mail server may emphasize accepting legitimate mail without accepting spam. Because an IP address engaged in spamming is assigned a reputation score 116 that is relatively lower than other malicious activity, such as a command center for a botnet, but higher than legitimate network traffic, the reputation score 116 score may be used to identify and respond to spam.
  • the threat analytics 120 may set thresholds preventing IP addresses having a reputation score 116 reflecting the participation in spamming from sending mail via the mail server.
  • a network may want to avoid alienating potential customers by filtering their traffic, so the threat analytics 120 may provide for a higher threshold, thereby potentially tolerating malicious activity on the level of spamming, for example, but not rising to the level of participation in a botnet.
  • other networks may involve sensitive data, and thus the threat analytics 120 may provide for a lower threshold, potentially eliminating some legitimate network traffic.
  • a network may provide feedback to an IP address having a reputation score 116 below the threshold to assist the end user in remedying the issues causing the high reputation score 116 and/or avenues for challenging the reputation score 116 .
  • a secure network such as a banking website, may issue an alert to an IP address having a reputation score 116 above the threshold informing the user that they are vulnerable to malicious activity and are consequently denied access to the site to protect the integrity of their banking data, computers and network.
  • the alert may further direct the user to an isolated and secure computing environment with instructions for remedying the vulnerabilities and therefore their reputation score 116 .
  • the alert may include a link to a secure site providing access to relevant security updates, including without limitation, security patches for software or operating systems, current versions of software or operating systems, and/or the like.
  • the threat analytics 120 proposes responses to threats based on the reputation scores 116 of the IP addresses associated with the threats, among other factors.
  • the proposed responses may include, without limitation, null routing network traffic associated with the threat, logically separating a malicious network, pushing information relating to the threat to firewalls on a friendly (i.e., known to be secure) network for the firewalls to block any traffic from the threat source, using access control list (ACL) blocks, and the like.
  • ACL access control list
  • the threat intelligence 114 as well as information regarding a threat, may be provided to other networks for use in blocking malicious activity.
  • a primary network 202 is in communication with various other networks, including a secondary network 204 and customer networks 206 , 208 , and 210 .
  • the primary network 202 may be from a large provider, such as a backbone provider, that facilitates communication and exchanges traffic between the secondary network 204 and the customer networks 206 , 208 , and 210 .
  • the customer networks 206 , 208 , and 210 may be wired or wireless networks under the control of or operated/maintained by one or more entities, such as an Internet Service Provider (ISP) or Mobile Network Operator (MNO) that provides access to the primary network 202 .
  • ISP Internet Service Provider
  • MNO Mobile Network Operator
  • the customer networks 206 , 208 , and 210 may provide Internet access to one or more end users.
  • the secondary network 204 may be, for example, a CDN. Although three customer networks and one secondary network are shown in the network environment 200 , more or fewer customer and/or secondary networks may interface with the primary network 202 . Furthermore, the network environment 200 may include endpoints beyond networks adjacent to the primary network 202 .
  • the primary network 202 includes multiple ingress/egress routers (e.g. edge routers 212 - 218 ), which may have one or more ports, in communication with the secondary network 204 and the customer networks 206 - 210 .
  • the edge router 214 of the primary network 202 interfaces with an edge router 220 of the secondary network 204
  • the edge routers 212 , 216 , and 218 of the primary network 202 interface with edge devices 222 , 224 , and 226 of the customer networks 210 , 208 , and 206 , respectively.
  • the edge devices 222 , 224 , and 226 are network devices that provide entry points into the primary network 202 via the customer networks 206 - 210 .
  • one or more end users may connect to the Internet with a user device using one of the edge devices 222 - 226 .
  • the user device may be any form of computing device, including, without limitation, a personal computer, a terminal, a workstation, a mobile phone, a mobile device, a tablet, a set top box, a multimedia console, a television, or the like.
  • the edge routers 212 - 218 communicate with each other across the primary network 202 over multiple iterations and hops of other routers contained within the primary network 202 .
  • the customer networks 206 - 210 and/or the secondary network 204 may include edge routers that communicate with other routers via one or more hops and interface with another network, gateway, end user, or the like.
  • the networks 202 - 210 exchange network traffic using border gateway protocol (BGP).
  • BGP is a telecommunications industry standard for an inter-autonomous system routing protocol (i.e., a connected group of one or more IP prefixes run by one or more network operators which has a single and clearly defined routing policy), including support for both route aggregation and Classless Inter Domain Routing (CIDR) between the networks 202 - 210 and one or more interconnection points.
  • CIDR Classless Inter Domain Routing
  • Network traffic data is captured on the edge routers 212 - 218 and enriched using BGP data, router details, location information, volume adjustment data, customer identifiers, and the like. Stated differently, network traffic data and statistics are gathered from the interaction of the primary network 202 with the secondary network 204 and the customer networks 206 - 210 and correlated to form the network traffic dataset 106 .
  • the network traffic dataset 106 provides information about sources, destinations, ingress/egress points, and other information about network traffic across the primary network 202 .
  • the network traffic dataset 106 may be used to evaluate network behavior and network traffic patterns of the primary network 202 with respect to network traffic transceived between (i.e., sent to and received by) various IP addresses via the secondary network 204 and/or the customer networks 206 - 210 .
  • the network traffic dataset 106 includes information on the identity of who sends and receives network traffic at a particular router interface (e.g., the edge routers 212 - 218 ) in the primary network 202 . This information may include, for example, a router identifier, an interface identifier for the particular router, an origin AS number, a destination AS number, and the like.
  • the network traffic dataset 106 may also include an estimation or approximation of the amount or rate of traffic transceived at the edge routers 214 - 218 in the primary network 202 .
  • the network traffic dataset 106 includes network traffic amounts and rates collected using Simple Network Management Protocol (SNMP) counters and messaging.
  • SNMP Simple Network Management Protocol
  • the network traffic dataset 106 includes information collected from BGP tables associated with the connectivity relationships of the primary network 202 with the secondary network 204 and the customer networks 206 - 210 .
  • the BGP tables may include routing tables having connectivity information (e.g., IP addresses, AS paths, etc.) that provide which destinations are reachable from a particular ingress router in a network that interfaces with an egress router in the primary network 202 .
  • connectivity information e.g., IP addresses, AS paths, etc.
  • egress AS numbers it may be determined to which network (e.g., the secondary network 204 and/or the customer networks 206 - 210 ) network traffic is being sent.
  • the network traffic dataset 106 specifies the sender and the receiver of a data transmission over the primary network 202 .
  • a router interface identifier, an IP address, router device identifier, or the like may be used to determine the network from which a transmission is being sent.
  • the network traffic dataset 106 may be used for geo-location purposes to determine a geographic location or proximity of a sender and a receiver of a data transmission (e.g., associated with an origination and/or destination IP address).
  • the network traffic dataset 106 may be used to identify malicious network activity based on network traffic patterns.
  • the processing cluster 104 identifies network traffic patterns, IP addresses deploying malware or engaging in other malicious activity, suspect networks, and the like.
  • the processing cluster 104 identifies malicious activity involving a botnet based on the network traffic dataset 106 .
  • a botnet is generally a collection of infected computing devices utilized for malicious activity, often without the knowledge of the users of such computing devices.
  • a command and control server distributes malware to the computing devices, thereby establishing control through the creation of a bot.
  • Botnets may be used to deploy denial of service (DOS) attacks involving a large volume of requests sent to a website, content provider, or other service to overwhelm and crash the site by exhausting the available bandwidth.
  • DOS denial of service
  • DDOS Distributed DOS
  • DOS or DDOS attacks may be discerned from the network traffic dataset 106 based on network traffic patterns, including traffic volume and traffic rate, for one or more IP addresses.
  • the network traffic dataset 106 may identify the source IP address associated with the command and control server controlling bots in a DDOS attack by tracing the communications from target to the bots to the source.
  • the initial transmission of bots or other malware may be identified using the network traffic dataset 106 based on a series of packets with the same size transceived between a common source IP address and multiple end IP addresses. Legitimate network traffic from an IP address will involve packets of various sizes based on the content requested or the activities engaged in by the IP address.
  • the network traffic dataset 106 may further be used to distinguish traffic corresponding to malicious activity based on a source port. For example, traffic often emanates from port 20 or port 80 corresponding to File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP) traffic, respectively, so traffic emanating from other ports may indicate malicious activity.
  • FTP File Transfer Protocol
  • HTTP Hypertext Transfer Protocol
  • the network environment 300 includes a CDN 302 , which may include components of one or more networks.
  • the CDN 302 is communicatively coupled to one or more customer networks 306 .
  • the customer network 306 may be wired or wireless networks under the control of or operated/maintained by one or more entities, such as an ISP or MNO, that provide access to the CDN 302 .
  • the customer network 306 may provide Internet access to one or more user devices 308 , as described herein.
  • the CDN 302 is capable of providing content to the user device 308 .
  • the content may include, without limitation, videos, multimedia, images, audio files, text, documents, software, data files, patches, web content, and other electronic resources.
  • the user device 308 is configured to request, receive, process, and present content.
  • the user device 308 includes an Internet browser application with which a link (e.g. a hyperlink) to content may be selected or otherwise entered, causing a request to be sent to a directory server 310 in the CDN 302 .
  • the directory server 310 responds to the request by providing a network address (e.g., an IP address) where the content associated with the selected link can be obtained.
  • a network address e.g., an IP address
  • the directory server 310 provides a domain name system (DNS) service, which resolves an alphanumeric domain name to an IP address.
  • DNS domain name system
  • the directory server 310 resolves the link name (e.g., a URL or other identifier) to an associated network address from which the user device 308 can retrieve the requested content.
  • the DNS log 110 includes a list of DNS requests and information about the requests, including the network addresses. It will be appreciated by those skilled in the art that the DNS log 110 may also be obtained in other network environments not involving content distribution.
  • the CDN 302 includes an edge server 312 , which may cache content from another server to make it available in a more geographically or logically proximate location to the user device 308 .
  • the edge server 312 is configured to provide requested content to a requestor, which may be the user device 308 or an intermediate device in the customer network 306 or in the CDN 302 .
  • the edge server 312 provides the requested content that is locally stored in cache.
  • the edge server 312 retrieves the requested content from another source, such as a media access server, a content distribution server 314 , or a content origin server 316 of a content provider network 318 . The content is then served to the user device 308 or another intermediate device in response to requests for content.
  • the CDN log 108 includes a list of content requests and responses to the requests, including what content or other inventory was requested and served.
  • the CDN log 108 further includes the IP address of the user device 308 , which is confirmed with TCP, as well as the user agent of the user device 308 , including the operating system running on the user device 308 , the type of computing device, the software running on the user device 308 , and the like.
  • example operations 400 for generating a reputation score for an IP address based on network security data an operation 402 obtains a network traffic dataset and a CDN log, and an operation 404 correlates the network traffic dataset with the CDN log.
  • an operation 406 identifies threat attributes for an IP address based on the correlation of the network traffic dataset with the CDN log. For example, the correlation may reveal a pattern of network traffic exchanged between an IP address known to engage in malicious activity and other IP addresses, thereby indicating that the other IP addresses are participating in or otherwise susceptible to an attack.
  • An operation 408 weights each of the threat attributes. Each of the threat attributes are weighted based on the type of activity, the source, and other factors, established, for example, via machine learning.
  • An operation 410 generates a reputation score for the IP address based on the weighted threat attributes.
  • an operation 412 To ensure that an IP address is not assigned a reputation score that is inherited based upon the activities of other users, an operation 412 generates a neighborhood score for an internet neighborhood of the IP address.
  • the internet neighborhood may be a netblock, an AS, a region, a country, and/or the like.
  • the operation 412 may generate a neighborhood score for each of the internet neighborhoods of the IP addresses.
  • An operation 414 generates a normalized reputation score for the IP address based on the neighborhood scores for the internet neighborhoods and the reputation score. Based on the normalized reputation score for the IP address, an operation 416 responds to a threat by the IP address.
  • the responses may include, without limitation: filtering network traffic sent from the IP address; null routing network traffic associated with the threat; logically separating a malicious network; pushing information relating to the threat to firewalls on a friendly network for the firewalls to block any traffic from the threat source; using ACL blocks; providing information regarding the threat, the normalized reputation score, and/or the IP address to other networks for use in blocking malicious activity; publishing a list of malicious actors, including the IP address; not responding to a CDN request by the IP address; and the like.
  • FIG. 5 a detailed description of an example computing system 500 having one or more computing units that may implement various systems and methods discussed herein is provided.
  • the computing system 500 may be applicable to the user devices, servers, processing cluster, machine learning system, and other computing or network devices. It will be appreciated that specific implementations of these devices may be of differing possible specific computing architectures not all of which are specifically discussed herein but will be understood by those of ordinary skill in the art.
  • the computer system 500 may be a general computing system is capable of executing a computer program product to execute a computer process. Data and program files may be input to the computer system 500 , which reads the files and executes the programs therein. Some of the elements of a general purpose computer system 500 are shown in FIG. 5 wherein a processor 502 is shown having an input/output (I/O) section 504 , a Central Processing Unit (CPU) 506 , and a memory section 508 . There may be one or more processors 502 , such that the processor 502 of the computer system 500 comprises a single central-processing unit 506 , or a plurality of processing units, commonly referred to as a parallel processing environment.
  • I/O input/output
  • CPU Central Processing Unit
  • memory section 508 There may be one or more processors 502 , such that the processor 502 of the computer system 500 comprises a single central-processing unit 506 , or a plurality of processing units, commonly referred to as a parallel processing environment.
  • the computer system 500 may be a conventional computer, a distributed computer, or any other type of computer, such as one or more external computers made available via a cloud computing architecture.
  • the presently described technology is optionally implemented in software devices loaded in memory 508 , stored on a configured DVD/CD-ROM 510 or storage unit 512 , and/or communicated via a wired or wireless network link 514 , thereby transforming the computer system 500 in FIG. 5 to a special purpose machine for implementing the described operations.
  • the I/O section 504 is connected to one or more user-interface devices (e.g., a keyboard 516 and a display unit 518 ), a disc storage unit 512 , and a disc drive unit 520 .
  • the input may be through a touch screen, voice commands, and/or Bluetooth connected keyboard, among other input mechanisms.
  • the disc drive unit 520 is a DVD/CD-ROM drive unit capable of reading the DVD/CD-ROM medium 510 , which typically contains programs and data 522 .
  • Computer program products containing mechanisms to effectuate the systems and methods in accordance with the presently described technology may reside in the memory section 504 , on a disc storage unit 512 , on the DVD/CD-ROM medium 510 of the computer system 500 , or on external storage devices made available via a cloud computing architecture with such computer program products, including one or more database management products, web server products, application server products, and/or other additional software components.
  • a disc drive unit 520 may be replaced or supplemented by an optical drive unit, a flash drive unit, magnetic drive unit, or other storage medium drive unit.
  • the disc drive unit 520 may be replaced or supplemented with random access memory (RAM), magnetic memory, optical memory, and/or various other possible forms of semiconductor based memories commonly found in smart phones and tablets.
  • RAM random access memory
  • the network adapter 524 is capable of connecting the computer system 500 to a network via the network link 514 , through which the computer system can receive instructions and data.
  • Examples of such systems include personal computers, Intel or PowerPC-based computing systems, AMD-based computing systems and other systems running a Windows-based, a UNIX-based, or other operating system. It should be understood that computing systems may also embody devices such as terminals, workstations, mobile phones, tablets, laptops, personal computers, multimedia consoles, gaming consoles, set top boxes, and the like.
  • the computer system 500 When used in a LAN-networking environment, the computer system 500 is connected (by wired connection or wirelessly) to a local network through the network interface or adapter 524 , which is one type of communications device.
  • the computer system 500 When used in a WAN-networking environment, the computer system 500 typically includes a modem, a network adapter, or any other type of communications device for establishing communications over the wide area network.
  • program modules depicted relative to the computer system 500 or portions thereof may be stored in a remote memory storage device. It is appreciated that the network connections shown are examples of communications devices for and other means of establishing a communications link between the computers may be used.
  • network security data collection, parsing, correlating, and analyzing software, threat intelligence software, and other modules and services may be embodied by instructions stored on such storage systems and executed by the processor 502 . Some or all of the operations described herein may be performed by the processor 502 .
  • local computing systems, remote data sources and/or services, and other associated logic represent firmware, hardware, and/or software configured to control operations of the processing cluster 104 , the various servers, user devices, network components, and/or computing units.
  • Such services may be implemented using a general purpose computer and specialized software (such as a server executing service software), a special purpose computing system and specialized software (such as a mobile device or network appliance executing service software), or other computing configurations.
  • one or more functionalities of the systems and methods disclosed herein may be generated by the processor 502 and a user may interact with a Graphical User Interface (GUI) using one or more user-interface devices (e.g., the keyboard 516 and the display unit 518 ) with some of the data in use directly coming from online sources and data stores.
  • GUI Graphical User Interface
  • FIG. 5 is but one possible example of a computer system that may employ or be configured in accordance with aspects of the present disclosure. It will be appreciated that other non-transitory tangible computer-readable storage media storing computer-executable instructions for implementing the presently disclosed technology on a computing system may be utilized.
  • the methods disclosed may be implemented as sets of instructions or software readable by a device. Further, it is understood that the specific order or hierarchy of steps in the methods disclosed are instances of example approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the method can be rearranged while remaining within the disclosed subject matter.
  • the accompanying method claims present elements of the various steps in a sample order, and are not necessarily meant to be limited to the specific order or hierarchy presented.
  • the described disclosure may be provided as a computer program product, or software, that may include a non-transitory machine-readable medium having stored thereon instructions, which may be used to program a computer system (or other electronic devices) to perform a process according to the present disclosure.
  • a machine-readable medium includes any mechanism for storing information in a form (e.g., software, processing application) readable by a machine (e.g., a computer).
  • the machine-readable medium may include, but is not limited to, magnetic storage medium, optical storage medium; magneto-optical storage medium, read only memory (ROM); random access memory (RAM); erasable programmable memory (e.g., EPROM and EEPROM); flash memory; or other types of medium suitable for storing electronic instructions.

Abstract

Implementations described and claimed herein provide systems and methods for generating threat intelligence based on network security data. In one implementation, a network traffic dataset representative of network traffic for an Internet Protocol address across one or more ports of a primary network is obtained. A content distribution network log associated with a content distribution network is obtained. The content distribution network log includes a history of content requests by the Internet Protocol address. The network traffic dataset is correlated with the content distribution network log based on the Internet Protocol address to obtain network security data. One or more threat attributes representative of malicious activity are identified from the network security data. The one or more threat attributes are weighted. Network threat intelligence is generated based on the weighted threat attributes using a processing cluster.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • The present application is a continuation-in-part of U.S. patent application Ser. No. 14/039,251, entitled “Apparatus, System and Method for Identifying and Mitigation Malicious Network Threats” and filed on Sep. 27, 2013, which claims benefit of priority under 35 U.S.C. §119(e) to U.S. Provisional Patent Application No. 61/707,310, entitled “Apparatus, System and Method for Identifying and Mitigation Malicious Network Threats” and filed on Sep. 28, 2012. Each of these applications is incorporated by reference in their entireties herein.
  • TECHNICAL FIELD
  • Aspects of the present disclosure relate to network security data collection, aggregation, and analysis, among other functions, and more particularly to the generation of network threat intelligence, including reputation scores and profiles, based on network security data.
  • BACKGROUND
  • Computing devices, including laptops and smartphones, connected to the Internet or other networks are generally confronted by interminable security risks. For example, the Internet is plagued by numerous malicious actors utilizing various forms of malware to damage or disable computing devices or systems, steal data, interrupt communications, extort businesses or individuals, and/or steal money, among other nefarious acts. Conventionally, the goal of detecting and mitigating such security risks is burdened by a cycle in which the malicious actors are constantly deploying new malware as defensive technologies are designed to address them. End users are therefore vulnerable until protection against an exploit is developed.
  • Identifying malicious actors remains a formidable challenge. Conventional security mechanisms may lack insight into the type of data traversing a network or the attributes of the computing device associated with an Internet Protocol (IP) address. As such, it is difficult to differentiate between malicious actors and legitimate end users. For example, end users who naïvely click on or otherwise install infected executables without realizing the consequences of their actions may appear as malicious actors. There is thus an ongoing need to distinguish malicious actors in identifying and addressing network security threats.
  • It is with these observations in mind, among others, that various aspects of the present disclosure were conceived and developed.
  • SUMMARY
  • Implementations described and claimed herein address the foregoing problems, among others, by providing systems and methods for generating network threat intelligence based on network security data. In one implementation, a network traffic dataset representative of network traffic for an Internet Protocol address across one or more ports of a primary network is obtained. The primary network is in communication with a content distribution network, and the Internet Protocol address corresponds to a computing device. A content distribution network log associated with the content distribution network is obtained. The content distribution network log includes a history of content requests by the Internet Protocol address. The network traffic dataset is correlated with the content distribution network log based on the Internet Protocol address to obtain network security data. One or more threat attributes representative of malicious activity are identified from the network security data. The one or more threat attributes are weighted. Network threat intelligence is generated based on the weighted threat attributes using a processing cluster.
  • Other implementations are also described and recited herein. Further, while multiple implementations are disclosed, still other implementations of the presently disclosed technology will become apparent to those skilled in the art from the following detailed description, which shows and describes illustrative implementations of the presently disclosed technology. As will be realized, the presently disclosed technology is capable of modifications in various aspects, all without departing from the spirit and scope of the presently disclosed technology. Accordingly, the drawings and detailed description are to be regarded as illustrative in nature and not limiting.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows an example system for generating network threat intelligence based on network security data.
  • FIG. 2 illustrates an example network environment for monitoring and correlating network traffic data.
  • FIG. 3 shows an example network environment for obtaining a content distribution network log and a domain name system log.
  • FIG. 4 illustrates example operations for generating a reputation score for an IP address based on network security data.
  • FIG. 5 is an example computing system that may implement various systems and methods discussed herein.
  • DETAILED DESCRIPTION
  • Aspects of the present disclosure involve systems and methods for generating network threat intelligence based on network security data. In one aspect, the network security data is collected, and may include a network traffic dataset, a Content Distribution Network (CDN) log, and a Domain Name System (DNS) log, among other types of data. Based on the unique data sources and attributes of the data, the systems and methods may identify specific threats and take any number of possible actions to address the threats.
  • A primary network, such as a large Internet Service Provider (ISP) or backbone provider, is uniquely positioned to capture and analyze the network security data. Generally, the network traffic dataset is obtained through the monitoring and correlation of network traffic over one or more ports in the primary network. Stated differently, network traffic data and statistics are gathered from the interaction of the primary network with one or more secondary networks and customer networks and correlated to form a network traffic dataset. The secondary networks may include networks beyond networks adjacent to the primary network. Generally, the network traffic dataset provides snapshots of traffic transceived across the primary network, from which network traffic patterns for at least one Internet Protocol (IP) address are obtained. For example, the network traffic patterns may reveal a pattern of network traffic exchanged between an IP address known to engage in malicious activity and other IP addresses, thereby indicating that the other IP addresses are participating in or otherwise susceptible to an attack. The type of data traversing the primary network and information regarding computing devices associated with the IP addresses exchanging network traffic, however, cannot be directly discerned from the network traffic dataset. As such, the network traffic dataset is correlated with the CDN log, among other types of data, to gain further insight into malicious activity and potential responses to thwart and prevent attacks.
  • The CDN log and other types of data, such as the DNS log, are obtained based on the interaction of IP addresses with a CDN. Generally, a CDN is a distributed system of servers deployed across a network to serve content with high performance and availability to IP addresses associated with end users. Content served via a CDN may include web objects (e.g., text, graphics, or scripts), downloadable objects (e.g., media files, software, or documents), applications (e.g., e-commerce or portals), streaming media (e.g., live or on-demand), social networks, and the like. Content providers, such as media companies or vendors, may contract with CDN operators to serve their content to their end users, and a CDN may utilize the primary network or other carriers or networks to host its servers.
  • An end user may request content on a user device connected to a CDN via a customer network. For example, a user may wish to stream a movie on a computer or any other number of possible user devices, as described herein. To start the movie, a link to the movie in a website or other interface may be selected. In some instances, the user may select a graphic of the movie, and that graphic is associated with the link that begins the process of obtaining the movie data from the CDN. Selection of the link in some form causes a request to be sent to a directory server providing a DNS service in the CDN. The directory server responds to the request by providing a network address (e.g., an IP address) from which the movie may be retrieved. The CDN log includes a history of such content requests from and deliveries to various IP addresses, and the DNS log includes a history of network addresses to which various IP addresses were resolved in response to the selection or input of a link (e.g., a Uniform Resource Locator (URL) or other identifier). The network traffic dataset enhanced with the CDN log and the DNS log provides hard data about an IP address and attributes of the IP address.
  • The network security data is correlated and parsed to determine a user agent, device type, content type, and other attributes corresponding to the IP address. Threat attributes are identified based on the network security data. The threat attributes supply a behavior profile of the IP address with the various activities of the IP address over a time frame. Each of the threat attributes are weighted based on the type of activity, the source, and other factors, established, for example, via machine learning. Based on the weighted threat attributes, network threat intelligence, including a reputation score, is generated. The reputation score represents a confidence level in a likelihood of whether an IP address engages in or is otherwise susceptible to malicious activity. The higher the score, the higher the confidence that the IP address engages in or is otherwise susceptible to malicious activity
  • Where there is a prevalence of IP addresses engaged in malicious activity concentrated in one network area associated with an IP address, the activity of that area may erroneously implicate the IP address, resulting in false positives of malicious activity. Thus, to ensure that an IP address is not assigned a reputation score that is inherited based upon the activities of other users, a neighborhood score for an internet neighborhood of the IP address is generated, where the internet neighborhood represents a collection of IP addresses related to the IP address at issue. The internet neighborhood may be a netblock (i.e., a set of grouped IP addresses having a start IP address and an end IP address), an autonomous system (AS), a region, a country, and/or other collections of IP addresses related to the IP address at issue.
  • The neighborhood score provides a reputation score for an internet neighborhood based on weighted threat attributes identified from network security data corresponding to network traffic involving the internet neighborhood. The neighborhood scores demonstrate whether the IP address is sending network traffic associated with malicious activity or simply in an internet neighborhood where such network traffic is frequently exchanged. For example, the IP address may be within a range of IP addresses assigned to a country that frequently participates in network attacks, but the IP address may not be engaged in such attacks. The neighborhood scores in this case may indicate that the reputation score of the IP address is higher than it should be as a result of the activity of the country. As another example, the IP address may be associated with a country lacking access to security updates and thus be more susceptible to malware and to infecting other devices, but the computing device associated with IP address may have nonetheless been able to obtain sufficient security updates. The neighborhood score for the country would be higher based on this susceptibility, which may be erroneously attributed to all the IP addresses within that country. Evaluating the reputation score for the IP address in view of the neighborhood score here would reveal that the reputation score for the IP address may be inflated based on the association of the IP address with the shortcomings of the country. A normalized reputation score for the IP address is thus generated based on the aggregated neighborhood scores for the internet neighborhoods and the reputation score for the IP address. Based on the normalized reputation score for the IP address, the primary network and/or the secondary network, such as a CDN, may respond to a threat by the IP address.
  • Turning to FIG. 1, an example system 100 for generating network threat intelligence based on network security data 102 is shown. In one implementation, a processing cluster 104 regularly gathers the security data 102 from a variety of trusted sources having information relating to the activity of IP addresses. A primary network, such as a large ISP or backbone provider, includes edge devices, servers, and other network components uniquely positioned to capture the security data 102.
  • In one implementation, the processing cluster 104 is configured to retrieve a network traffic dataset 106 providing information about IP addresses known to host malicious activity. The network traffic dataset 106 is obtained through the monitoring and correlation of network traffic over one or more ports in the primary network, for example, as described with respect to FIG. 2. The network traffic dataset 106 may be used to identify a gross level of potential malicious actors based on the IP addresses between which traffic is exchanged via the primary network. For example, the network traffic dataset 106 may reveal traffic patterns indicative of a host IP address for a command and control server for a botnet, which is a collection of network-connected programs communicating with other similar programs in order to perform tasks, such as spam email, distributed denial-of-service attacks, or other malicious activity. As such, any IP addresses exchanging traffic with the host IP address are likely bots engaging in the malicious activity. The network traffic dataset 106 thus identifies IP addresses associated with malicious activity.
  • The network traffic dataset 106 may be enhanced with a CDN log 108, and a DNS log 110 to provide insight into the type of data traversing the primary network as well as attributes of the IP address, including characteristics of the computing device associated with the IP address. The CDN log 108 includes a history of content requests from and deliveries to various IP addresses, and the DNS log 110 includes a history of network addresses to which various IP addresses were resolved in response to the selection or input of a link (e.g., a URL or other identifier). The CDN log 108 and the DNS log 110 may be obtained, for example, as described with respect to FIG. 3 and retrieved by the processing cluster 104.
  • In one implementation, the CDN log 108 includes an Application Layer Routing (ALR) log, which details the IP address, URL request, and user agent (e.g., type of computing device, operating system type and version running on the computing device, other software running on the computing device, etc.), as well as the content requested. The CDN log 108 obtains the user agent from a header included in requests and other communications sent by the computing device and tied to the IP address, which is verified by confirming the extender line (i.e., bidirectional communication between the IP address and the CDN) using Transmission Control Protocol (TCP). The CDN log 108 thus provides information regarding content requested from a CDN and information regarding the computing device requesting the content.
  • The network traffic dataset 106 enhanced with the CDN log 108 provides granular information regarding the malicious activity associated with the IP address. For example, in the case of a botnet as discussed above, the CDN log 108 includes information about the particular malware deployed from the IP address, including the operating system and software used to design the malware and the operating systems targeted by the malware. Knowing the operating system and other software used to design and deploy malware, as well as the operating systems and computing device types targeted by the malware, assists in identifying and remedying vulnerabilities in the operating systems exploited by the malware and in determining targets susceptible to the malware. This information further provides insight into how malicious actors behave and what they target, thereby informing the development of new or improved security tool. Similarly, knowing the content requested by the IP address deploying the malware may provide information on potential targets. For example, an IP address engaged in malicious activity that frequents healthcare websites may evidence a potential or current threat targeting the healthcare industry.
  • The security data 102 generally provides a landscape of network threats with granular detail. As discussed above, the network traffic dataset 106 associates an IP address to malicious activity based on the exchange of traffic with IP addresses known to engage in or be vulnerable to such activity. The CDN log 108 provides insight into the type of device associated with the IP address, what software and operating systems are running on the device, and what content is being requested. The requested content may suggest targets for malicious activity. For example, if an IP address associated with malicious activity frequents healthcare sites, the IP address may be targeting actors within the healthcare industry. The DNS log 110 may be used, as described with respect to FIGS. 2-3 to pin the IP address to a particular geographical location. The geographical location of an IP address may inform a threat level based on the vulnerability or malicious activity in the geographical location. For example, a netblock, AS, or country may lack access to security updates and thus be more susceptible to malware and to infecting other devices. The security data 102 thus provides tangible information, rather than mere statistical inference, regarding an IP address and attributes of the IP address, such as location, user agent, requested content, and the like.
  • Other data 112 may be provided to the processing cluster 104 to provide additional granularity regarding the attributes of the IP addresses. The other data 112 may include one or more enrichment feeds having data that: may be correlated with the end users (i.e., with the IP addresses); relates to one or more networks in communication with the primary network (e.g., secondary or customer networks); and/or otherwise enhances the security data 102. In one implementation, the other data 112 includes data from electrically accessible sources relating to the activities of IP addresses and domains. These sources may include, without limitation, honeypots (i.e., a computer, data, or network site appearing as part of a network but is actually isolated and monitored to investigate malicious activity), Open Source Intelligence (OSI) databases, trusted partner databases, intrusion detection system alerts, spam origins, abuse complaints, and the like.
  • In one implementation, the processing cluster 104 communicates with and retrieves the security data 102 and/or the other data 112 at regularly scheduled intervals. In another implementation, the processing cluster 104 receives the security data 102 and/or the other data 112 in substantially real time. In still another implementation, the processing cluster 104 retrieves the security data 102 and/or the other data 112 in response to a manual command. The processing cluster 104 may receive data over a network (e.g., the Internet, an enterprise intranet, etc.), via an Application Programming Interface (API) for a source, and/or the like.
  • The processing cluster 104 is configured to parse, tag, and/or associate data elements for storage and analysis. The processing cluster 104 may include various modules, components, systems, infrastructures, and/or applications that may be combined in various ways, including into a single software application or multiple software applications. The security data 102 and the other data 112 provided to the processing cluster 104 is stored in one or more non-relational databases 122, in one specific implementation. The processing cluster 104 is a distributed, scalable storage layer that is configured to store a large volume of structured and unstructured data. In one implementation, the processing cluster 104 replicates and distributes blocks of data through cluster nodes, along with numerous other features and advantages. As such, the processing cluster 104 generally manages the processing, storage, analysis, and retrieval of large volumes of data in the non-relational database 122. The processing cluster 104 may include, for example, Storm, Hadoop®, or the like.
  • In one implementation, the security data 102 and/or the other data 112 is received at one or more router interfaces, which is running an agent, such as Flume or other aggregation modules. The agent extracts, ingests, and imports the security data 102 and/or the other data 112 into the processing cluster 104, where the security data 102 and/or the other data 112 is transformed, aggregated, parsed, and assigned relevancy values and locations for storage in the database 122. In one implementation, prior to input into the processing cluster 104, the security data 102 and/or the other data 112 is timestamped using a messaging bus, which may be, for example, Apache Kafka, zeromq, or the like.
  • The processing cluster 104 serializes and stores the security data 102 and/or the other data 112, such that network threat intelligence 114 may be generated based on a query. The processing cluster 104 processes a query in multiple parts at the cluster node level and aggregates the results to generate the network threat intelligence 114. In one implementation, the processing cluster 104 receives a query in structured query language (SQL), aggregates data stored in the database 122, and outputs the threat intelligence 114 in a format enabling further management, analysis, and/or merging with other data sources.
  • In one implementation, in serializing the security data 102 and/or the other data 112, the processing cluster 104 filters and packages the data into a uniform record format for storage in the database 122. During filtering, any irrelevant information, including misinformed information, is removed. The filtered data is then normalized into a standard format and aggregated based on IP address into a record with duplicate records removed. The processing cluster 104 assigns relevancy values to the records based on the data in the record and/or information retrieved from an internal or external source. The relevancy values may involve the IP address, the computing device, and the user agent. The processing cluster 104 utilizes the relevancy values in generating the threat intelligence 114 in response to a query.
  • The processing cluster 104 may generate the threat intelligence 114 using machine learning techniques deployed with a machine learning system 124. The machine learning techniques provided by the machine learning system 124 generally involve a machine learning through observing data that represents incomplete information about statistical happenings and generalizing such data to rules and/or algorithms that make predictions for future data, trends, and the like. Machine learning typically includes “classification” where machines learn to automatically recognize complex patterns and make intelligent predictions for a class.
  • Generally, the threat intelligence 114 identifies IP addresses associated with malicious actors and differentiates such actors from legitimate end users. In one implementation, the threat intelligence 114 involves a correlation of IP addresses, user agents, geographical locations, and content requests. The threat intelligence 114 may include a reputation score 116, a reputation profile 118, and threat analytics 120. Based on the threat intelligence 114, a response to threats by a particular IP address may be determined.
  • In one implementation, the reputation score 116 involves weighting threat attributes of the security data 102 to identify and/or predict the presence of malicious activity. The processing cluster 104 assigns a weight to each threat attribute in a record that corresponds to a nature of the associated threat, including a type of activity and a source of data indicating the activity. For example, a low weight may be assigned to threat attributes related to port 80 (i.e., the default port for insecure Internet connection) because it is common to have traffic on port 80. Conversely, a higher weight may be assigned to threat attributes related to other ports with lower traffic activity because any traffic on through such ports is rare, which may be indicative of malicious activity. Similarly, sending spam may receive a lower weight than participation in a botnet. In one implementation, the machine learning system 124 assigns a weight or dynamically readjusts a weight for threat attributes. For example, the machine learning system 124 may track future activity and effects of that activity compared to the assigned weights for that activity to dynamically adjust weights for similar activity. The processing cluster 104 parses the weighted threat attributes and uses the parsed weighted threat attributes to generate a baseline reputation score for each IP address.
  • The reputation score 116 is a single value (e.g., a percentage) representing a confidence level in a likelihood of whether an IP address engages in or is otherwise susceptible to malicious activity. The higher the reputation score 116 the higher the confidence that the IP address engages in or is otherwise susceptible to malicious activity. Where there is a prevalence of IP addresses engaged in malicious activity concentrated in one network area associated with an IP address, the activity of that area may erroneously implicate the IP address, resulting in an inflated reputation score 116 for the IP address. To ensure that an IP address is not assigned a reputation score 116 that is inherited based upon the activities of other users, a neighborhood score for an internet neighborhood of the IP address is generated. The internet neighborhood represents a collection of IP addresses related to the IP address at issue and may be a netblock, an AS, a region, a country, and/or other collections of IP addresses.
  • The neighborhood score provides a reputation score for an internet neighborhood based on weighted threat attributes identified from the network security data 102 corresponding to the internet neighborhood. Specifically, threat attributes are identified from the network security data 102 based on the various activities of the IP addresses within the internet neighborhood over a time frame, thereby supplying a behavior profile of the internet neighborhood. Each of the threat attributes are weighted based on the type of activity, the reporting source, and other factors, established, for example, via machine learning, as described herein with respect to the reputation score 116. Based on the weighted threat attributes, the neighborhood score for the internet neighborhood is generated.
  • The neighborhood scores demonstrate whether the IP address is sending network traffic associated with malicious activity or simply in an internet neighborhood where such network traffic is frequently exchanged. For example, the IP address may be within a range of IP addresses assigned to a country that frequently participates in network attacks, but the IP address may not be engaged in such attacks. The neighborhood scores in this case may indicate that the reputation score 116 of the IP address is higher than it should be as a result of the activity of the country. As another example, the IP address may be associated with a country lacking access to security updates and thus be more susceptible to malware and to infecting other devices, but the computing device associated with IP address may have nonetheless been able to obtain sufficient security updates. The neighborhood score for the country would be higher based on this susceptibility, which may be erroneously attributed to all the IP addresses within that country. Evaluating the reputation score 116 for the IP address in view of the neighborhood score here would reveal that the reputation score 116 for the IP address may be erroneously inflated based on the association of the IP address with the shortcomings of the country.
  • The processing cluster 104 thus generates a neighborhood score for each of the internet neighborhoods of the IP address and normalizes the reputation score 116 based on the neighborhood scores for the internet neighborhoods. As such, the reputation score 116 is a normalized reputation score for the IP address taking into account the activity of the IP address and the activity of other uses that may be influencing a perceived threat level of the IP address. In one implementation, the processing cluster 104 regularly updates the reputation score 116 based on current activity by the associated IP address as the security data 102 is regularly collected, parsed, and analyzed.
  • In one implementation, the processing cluster 104 and/or the machine learning system 124 evaluates the reputation score 116 to generate the reputation profile 118, which provides detail regarding the weighted threat attributes and/or the basis of the reputation score, including activity of the IP address demonstrating that the IP address is engaging in or vulnerable to malicious activity. For example, a computing device operating at an IP address with no firewall, open ports, and/or outdated software may not be actively or intentionally engaging in malicious activity. However, given the vulnerability of the computing device to malware, the IP address may receive a higher reputation score 116.
  • A user may query the processing cluster 104 to obtain the reputation score 116 and/or the reputation profile 118 for one or more IP addresses to facilitate responding to network threats without limiting the network activity of legitimate end users. The reputation score 116 and/or the reputation profile 118 may be replicated to memory caches in edge servers, so the user experiences reduced latency when querying the processing cluster 104. In one implementation, the reputation score 116 may be used to determine a source of a current attack and respond accordingly. A high reputation score 116 represents a high confidence that the IP address is engaged in malicious behavior and thus may merit a relatively strong response, such as dropping the traffic emanating from the IP address at the network edge. The reputation score 116 thus informs traffic filtering during an attack, so network traffic from those IP addresses likely to be participating in the attack may be dropped without denying service to those likely to be legitimate users.
  • The threat analytics 120 may include trends in network threats, maps providing visual representations of network threats or trends, predictions of future activity, proposed responses to threats, effectiveness of responses to threats, and the like. The trends in network threats may provide insight into changes in malicious activities and the relationship of such activities to attributes of IP addresses. For example, the trends may indicate an increase in the occurrence of malware targeting Windows® operating systems. In one implementation, the threat analytics 120 include a map correlating geographical regions to the reputation score 116 of IP addresses within those regions. In another implementation, the threat analytics 120 include a map correlating device type, operating system, software, and/or the like with market and the reputation score 116 of the IP addresses within the market. For example, the map may reveal a particular country with a high reputation score 116 due to a high occurrence of computing devices running Windows® susceptible to malicious activity in the country based on a lack of access to Windows® security updates.
  • In one implementation, the threat analytics 120 inform a determination of a threshold for filtering network traffic or otherwise responding to malicious activity based on the reputation score 116. Stated differently, network traffic exchanged with IP addresses having a reputation score 116 above a threshold (e.g., 50%) may be filtered, with the threshold set using the threat analytics 120. The threshold may be set based on various factors, including, without limitation, business practices, vulnerability to malicious activities, factors established using the machine learning system 124, customer feedback, and the like.
  • For example, the business practices of a mail server may emphasize accepting legitimate mail without accepting spam. Because an IP address engaged in spamming is assigned a reputation score 116 that is relatively lower than other malicious activity, such as a command center for a botnet, but higher than legitimate network traffic, the reputation score 116 score may be used to identify and respond to spam. Here, the threat analytics 120 may set thresholds preventing IP addresses having a reputation score 116 reflecting the participation in spamming from sending mail via the mail server. As another example, a network may want to avoid alienating potential customers by filtering their traffic, so the threat analytics 120 may provide for a higher threshold, thereby potentially tolerating malicious activity on the level of spamming, for example, but not rising to the level of participation in a botnet. On the other hand, other networks may involve sensitive data, and thus the threat analytics 120 may provide for a lower threshold, potentially eliminating some legitimate network traffic.
  • In one implementation, a network may provide feedback to an IP address having a reputation score 116 below the threshold to assist the end user in remedying the issues causing the high reputation score 116 and/or avenues for challenging the reputation score 116. For example, a secure network, such as a banking website, may issue an alert to an IP address having a reputation score 116 above the threshold informing the user that they are vulnerable to malicious activity and are consequently denied access to the site to protect the integrity of their banking data, computers and network. The alert may further direct the user to an isolated and secure computing environment with instructions for remedying the vulnerabilities and therefore their reputation score 116. For example, the alert may include a link to a secure site providing access to relevant security updates, including without limitation, security patches for software or operating systems, current versions of software or operating systems, and/or the like.
  • In one implementation, the threat analytics 120 proposes responses to threats based on the reputation scores 116 of the IP addresses associated with the threats, among other factors. The proposed responses may include, without limitation, null routing network traffic associated with the threat, logically separating a malicious network, pushing information relating to the threat to firewalls on a friendly (i.e., known to be secure) network for the firewalls to block any traffic from the threat source, using access control list (ACL) blocks, and the like. The threat intelligence 114, as well as information regarding a threat, may be provided to other networks for use in blocking malicious activity.
  • Turning to FIG. 2, an example network environment 200 for monitoring and correlating network traffic data is shown. In one implementation, a primary network 202 is in communication with various other networks, including a secondary network 204 and customer networks 206, 208, and 210. The primary network 202 may be from a large provider, such as a backbone provider, that facilitates communication and exchanges traffic between the secondary network 204 and the customer networks 206, 208, and 210. The customer networks 206, 208, and 210 may be wired or wireless networks under the control of or operated/maintained by one or more entities, such as an Internet Service Provider (ISP) or Mobile Network Operator (MNO) that provides access to the primary network 202. Thus, for example, the customer networks 206, 208, and 210 may provide Internet access to one or more end users. The secondary network 204 may be, for example, a CDN. Although three customer networks and one secondary network are shown in the network environment 200, more or fewer customer and/or secondary networks may interface with the primary network 202. Furthermore, the network environment 200 may include endpoints beyond networks adjacent to the primary network 202.
  • The primary network 202 includes multiple ingress/egress routers (e.g. edge routers 212-218), which may have one or more ports, in communication with the secondary network 204 and the customer networks 206-210. For example, the edge router 214 of the primary network 202 interfaces with an edge router 220 of the secondary network 204, and the edge routers 212, 216, and 218 of the primary network 202 interface with edge devices 222, 224, and 226 of the customer networks 210, 208, and 206, respectively. The edge devices 222, 224, and 226 are network devices that provide entry points into the primary network 202 via the customer networks 206-210. Stated differently, one or more end users may connect to the Internet with a user device using one of the edge devices 222-226. The user device may be any form of computing device, including, without limitation, a personal computer, a terminal, a workstation, a mobile phone, a mobile device, a tablet, a set top box, a multimedia console, a television, or the like. In some implementations, the edge routers 212-218 communicate with each other across the primary network 202 over multiple iterations and hops of other routers contained within the primary network 202. Similarly, the customer networks 206-210 and/or the secondary network 204 may include edge routers that communicate with other routers via one or more hops and interface with another network, gateway, end user, or the like.
  • In one implementation, the networks 202-210 exchange network traffic using border gateway protocol (BGP). BGP is a telecommunications industry standard for an inter-autonomous system routing protocol (i.e., a connected group of one or more IP prefixes run by one or more network operators which has a single and clearly defined routing policy), including support for both route aggregation and Classless Inter Domain Routing (CIDR) between the networks 202-210 and one or more interconnection points.
  • Network traffic data is captured on the edge routers 212-218 and enriched using BGP data, router details, location information, volume adjustment data, customer identifiers, and the like. Stated differently, network traffic data and statistics are gathered from the interaction of the primary network 202 with the secondary network 204 and the customer networks 206-210 and correlated to form the network traffic dataset 106. The network traffic dataset 106 provides information about sources, destinations, ingress/egress points, and other information about network traffic across the primary network 202. In other words, the network traffic dataset 106 may be used to evaluate network behavior and network traffic patterns of the primary network 202 with respect to network traffic transceived between (i.e., sent to and received by) various IP addresses via the secondary network 204 and/or the customer networks 206-210.
  • The network traffic dataset 106 includes information on the identity of who sends and receives network traffic at a particular router interface (e.g., the edge routers 212-218) in the primary network 202. This information may include, for example, a router identifier, an interface identifier for the particular router, an origin AS number, a destination AS number, and the like. The network traffic dataset 106 may also include an estimation or approximation of the amount or rate of traffic transceived at the edge routers 214-218 in the primary network 202. In one implementation, the network traffic dataset 106 includes network traffic amounts and rates collected using Simple Network Management Protocol (SNMP) counters and messaging. In another implementation, the network traffic dataset 106 includes information collected from BGP tables associated with the connectivity relationships of the primary network 202 with the secondary network 204 and the customer networks 206-210. The BGP tables may include routing tables having connectivity information (e.g., IP addresses, AS paths, etc.) that provide which destinations are reachable from a particular ingress router in a network that interfaces with an egress router in the primary network 202. With egress AS numbers, it may be determined to which network (e.g., the secondary network 204 and/or the customer networks 206-210) network traffic is being sent.
  • In one implementation, the network traffic dataset 106 specifies the sender and the receiver of a data transmission over the primary network 202. For example, a router interface identifier, an IP address, router device identifier, or the like may be used to determine the network from which a transmission is being sent. Similarly, the network traffic dataset 106 may be used for geo-location purposes to determine a geographic location or proximity of a sender and a receiver of a data transmission (e.g., associated with an origination and/or destination IP address).
  • As described herein, the network traffic dataset 106 may be used to identify malicious network activity based on network traffic patterns. In one implementation, the processing cluster 104 identifies network traffic patterns, IP addresses deploying malware or engaging in other malicious activity, suspect networks, and the like.
  • In one implementation, the processing cluster 104 identifies malicious activity involving a botnet based on the network traffic dataset 106. As described herein, a botnet is generally a collection of infected computing devices utilized for malicious activity, often without the knowledge of the users of such computing devices. A command and control server distributes malware to the computing devices, thereby establishing control through the creation of a bot. Botnets may be used to deploy denial of service (DOS) attacks involving a large volume of requests sent to a website, content provider, or other service to overwhelm and crash the site by exhausting the available bandwidth. Distributed DOS (DDOS) involve an attack emanating from multiple IP addresses in multiple locations, thereby making such attacks difficult to identify and prevent.
  • DOS or DDOS attacks may be discerned from the network traffic dataset 106 based on network traffic patterns, including traffic volume and traffic rate, for one or more IP addresses. For example, the network traffic dataset 106 may identify the source IP address associated with the command and control server controlling bots in a DDOS attack by tracing the communications from target to the bots to the source. In one implementation, the initial transmission of bots or other malware may be identified using the network traffic dataset 106 based on a series of packets with the same size transceived between a common source IP address and multiple end IP addresses. Legitimate network traffic from an IP address will involve packets of various sizes based on the content requested or the activities engaged in by the IP address. Conversely, an IP address engaged in malicious activity, such as participation in a botnet, will often involve transmission of the same data to numerous other IP addresses, which will appear as a series of packets of the same size sent to those other IP addresses. The network traffic dataset 106 may further be used to distinguish traffic corresponding to malicious activity based on a source port. For example, traffic often emanates from port 20 or port 80 corresponding to File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP) traffic, respectively, so traffic emanating from other ports may indicate malicious activity.
  • As described herein, the information that may be gleaned from the network traffic dataset 106, and may be enhanced using the CDN log 108 and the DNS log 110. For a detailed discussion of an example network environment 300 for obtaining the CDN log 108 and the DNS log 110, reference is made to FIG. 3. As shown, the network environment 300 includes a CDN 302, which may include components of one or more networks. In one implementation, the CDN 302 is communicatively coupled to one or more customer networks 306. The customer network 306 may be wired or wireless networks under the control of or operated/maintained by one or more entities, such as an ISP or MNO, that provide access to the CDN 302. Thus, for example, the customer network 306 may provide Internet access to one or more user devices 308, as described herein.
  • The CDN 302 is capable of providing content to the user device 308. The content may include, without limitation, videos, multimedia, images, audio files, text, documents, software, data files, patches, web content, and other electronic resources. The user device 308 is configured to request, receive, process, and present content. In one implementation, the user device 308 includes an Internet browser application with which a link (e.g. a hyperlink) to content may be selected or otherwise entered, causing a request to be sent to a directory server 310 in the CDN 302.
  • The directory server 310 responds to the request by providing a network address (e.g., an IP address) where the content associated with the selected link can be obtained. In one implementation, the directory server 310 provides a domain name system (DNS) service, which resolves an alphanumeric domain name to an IP address. The directory server 310 resolves the link name (e.g., a URL or other identifier) to an associated network address from which the user device 308 can retrieve the requested content. The DNS log 110 includes a list of DNS requests and information about the requests, including the network addresses. It will be appreciated by those skilled in the art that the DNS log 110 may also be obtained in other network environments not involving content distribution.
  • In one implementation, the CDN 302 includes an edge server 312, which may cache content from another server to make it available in a more geographically or logically proximate location to the user device 308. The edge server 312 is configured to provide requested content to a requestor, which may be the user device 308 or an intermediate device in the customer network 306 or in the CDN 302. In one implementation, the edge server 312 provides the requested content that is locally stored in cache. In another implementation, the edge server 312 retrieves the requested content from another source, such as a media access server, a content distribution server 314, or a content origin server 316 of a content provider network 318. The content is then served to the user device 308 or another intermediate device in response to requests for content. The CDN log 108 includes a list of content requests and responses to the requests, including what content or other inventory was requested and served. The CDN log 108 further includes the IP address of the user device 308, which is confirmed with TCP, as well as the user agent of the user device 308, including the operating system running on the user device 308, the type of computing device, the software running on the user device 308, and the like.
  • Turning to FIG. 4, example operations 400 for generating a reputation score for an IP address based on network security data. In one implementation, an operation 402 obtains a network traffic dataset and a CDN log, and an operation 404 correlates the network traffic dataset with the CDN log.
  • In one implementation, an operation 406 identifies threat attributes for an IP address based on the correlation of the network traffic dataset with the CDN log. For example, the correlation may reveal a pattern of network traffic exchanged between an IP address known to engage in malicious activity and other IP addresses, thereby indicating that the other IP addresses are participating in or otherwise susceptible to an attack. An operation 408 weights each of the threat attributes. Each of the threat attributes are weighted based on the type of activity, the source, and other factors, established, for example, via machine learning. An operation 410 generates a reputation score for the IP address based on the weighted threat attributes.
  • To ensure that an IP address is not assigned a reputation score that is inherited based upon the activities of other users, an operation 412 generates a neighborhood score for an internet neighborhood of the IP address. The internet neighborhood may be a netblock, an AS, a region, a country, and/or the like. The operation 412 may generate a neighborhood score for each of the internet neighborhoods of the IP addresses. An operation 414 generates a normalized reputation score for the IP address based on the neighborhood scores for the internet neighborhoods and the reputation score. Based on the normalized reputation score for the IP address, an operation 416 responds to a threat by the IP address. The responses may include, without limitation: filtering network traffic sent from the IP address; null routing network traffic associated with the threat; logically separating a malicious network; pushing information relating to the threat to firewalls on a friendly network for the firewalls to block any traffic from the threat source; using ACL blocks; providing information regarding the threat, the normalized reputation score, and/or the IP address to other networks for use in blocking malicious activity; publishing a list of malicious actors, including the IP address; not responding to a CDN request by the IP address; and the like.
  • Referring to FIG. 5, a detailed description of an example computing system 500 having one or more computing units that may implement various systems and methods discussed herein is provided. The computing system 500 may be applicable to the user devices, servers, processing cluster, machine learning system, and other computing or network devices. It will be appreciated that specific implementations of these devices may be of differing possible specific computing architectures not all of which are specifically discussed herein but will be understood by those of ordinary skill in the art.
  • The computer system 500 may be a general computing system is capable of executing a computer program product to execute a computer process. Data and program files may be input to the computer system 500, which reads the files and executes the programs therein. Some of the elements of a general purpose computer system 500 are shown in FIG. 5 wherein a processor 502 is shown having an input/output (I/O) section 504, a Central Processing Unit (CPU) 506, and a memory section 508. There may be one or more processors 502, such that the processor 502 of the computer system 500 comprises a single central-processing unit 506, or a plurality of processing units, commonly referred to as a parallel processing environment. The computer system 500 may be a conventional computer, a distributed computer, or any other type of computer, such as one or more external computers made available via a cloud computing architecture. The presently described technology is optionally implemented in software devices loaded in memory 508, stored on a configured DVD/CD-ROM 510 or storage unit 512, and/or communicated via a wired or wireless network link 514, thereby transforming the computer system 500 in FIG. 5 to a special purpose machine for implementing the described operations.
  • The I/O section 504 is connected to one or more user-interface devices (e.g., a keyboard 516 and a display unit 518), a disc storage unit 512, and a disc drive unit 520. In the case of a tablet device, the input may be through a touch screen, voice commands, and/or Bluetooth connected keyboard, among other input mechanisms. Generally, the disc drive unit 520 is a DVD/CD-ROM drive unit capable of reading the DVD/CD-ROM medium 510, which typically contains programs and data 522. Computer program products containing mechanisms to effectuate the systems and methods in accordance with the presently described technology may reside in the memory section 504, on a disc storage unit 512, on the DVD/CD-ROM medium 510 of the computer system 500, or on external storage devices made available via a cloud computing architecture with such computer program products, including one or more database management products, web server products, application server products, and/or other additional software components. Alternatively, a disc drive unit 520 may be replaced or supplemented by an optical drive unit, a flash drive unit, magnetic drive unit, or other storage medium drive unit. Similarly, the disc drive unit 520 may be replaced or supplemented with random access memory (RAM), magnetic memory, optical memory, and/or various other possible forms of semiconductor based memories commonly found in smart phones and tablets.
  • The network adapter 524 is capable of connecting the computer system 500 to a network via the network link 514, through which the computer system can receive instructions and data. Examples of such systems include personal computers, Intel or PowerPC-based computing systems, AMD-based computing systems and other systems running a Windows-based, a UNIX-based, or other operating system. It should be understood that computing systems may also embody devices such as terminals, workstations, mobile phones, tablets, laptops, personal computers, multimedia consoles, gaming consoles, set top boxes, and the like.
  • When used in a LAN-networking environment, the computer system 500 is connected (by wired connection or wirelessly) to a local network through the network interface or adapter 524, which is one type of communications device. When used in a WAN-networking environment, the computer system 500 typically includes a modem, a network adapter, or any other type of communications device for establishing communications over the wide area network. In a networked environment, program modules depicted relative to the computer system 500 or portions thereof, may be stored in a remote memory storage device. It is appreciated that the network connections shown are examples of communications devices for and other means of establishing a communications link between the computers may be used.
  • In an example implementation, network security data collection, parsing, correlating, and analyzing software, threat intelligence software, and other modules and services may be embodied by instructions stored on such storage systems and executed by the processor 502. Some or all of the operations described herein may be performed by the processor 502. Further, local computing systems, remote data sources and/or services, and other associated logic represent firmware, hardware, and/or software configured to control operations of the processing cluster 104, the various servers, user devices, network components, and/or computing units. Such services may be implemented using a general purpose computer and specialized software (such as a server executing service software), a special purpose computing system and specialized software (such as a mobile device or network appliance executing service software), or other computing configurations. In addition, one or more functionalities of the systems and methods disclosed herein may be generated by the processor 502 and a user may interact with a Graphical User Interface (GUI) using one or more user-interface devices (e.g., the keyboard 516 and the display unit 518) with some of the data in use directly coming from online sources and data stores.
  • The system set forth in FIG. 5 is but one possible example of a computer system that may employ or be configured in accordance with aspects of the present disclosure. It will be appreciated that other non-transitory tangible computer-readable storage media storing computer-executable instructions for implementing the presently disclosed technology on a computing system may be utilized.
  • In the present disclosure, the methods disclosed may be implemented as sets of instructions or software readable by a device. Further, it is understood that the specific order or hierarchy of steps in the methods disclosed are instances of example approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the method can be rearranged while remaining within the disclosed subject matter. The accompanying method claims present elements of the various steps in a sample order, and are not necessarily meant to be limited to the specific order or hierarchy presented.
  • The described disclosure may be provided as a computer program product, or software, that may include a non-transitory machine-readable medium having stored thereon instructions, which may be used to program a computer system (or other electronic devices) to perform a process according to the present disclosure. A machine-readable medium includes any mechanism for storing information in a form (e.g., software, processing application) readable by a machine (e.g., a computer). The machine-readable medium may include, but is not limited to, magnetic storage medium, optical storage medium; magneto-optical storage medium, read only memory (ROM); random access memory (RAM); erasable programmable memory (e.g., EPROM and EEPROM); flash memory; or other types of medium suitable for storing electronic instructions.
  • The description above includes example systems, methods, techniques, instruction sequences, and/or computer program products that embody techniques of the present disclosure. However, it is understood that the described disclosure may be practiced without these specific details.
  • It is believed that the present disclosure and many of its attendant advantages will be understood by the foregoing description, and it will be apparent that various changes may be made in the form, construction and arrangement of the components without departing from the disclosed subject matter or without sacrificing all of its material advantages. The form described is merely explanatory, and it is the intention of the following claims to encompass and include such changes.
  • While the present disclosure has been described with reference to various embodiments, it will be understood that these embodiments are illustrative and that the scope of the disclosure is not limited to them. Many variations, modifications, additions, and improvements are possible. More generally, embodiments in accordance with the present disclosure have been described in the context of particular implementations. Functionality may be separated or combined in blocks differently in various embodiments of the disclosure or described with different terminology. These and other variations, modifications, additions, and improvements may fall within the scope of the disclosure as defined in the claims that follow.

Claims (20)

What is claimed is:
1. A method for identifying network threats, the method comprising:
obtaining a network traffic dataset representative of network traffic for an Internet Protocol address across one or more ports of a primary network, the primary network in communication with a content distribution network, the Internet Protocol address corresponding to a computing device;
obtaining a content distribution network log associated with the content distribution network, the content distribution network log including a history of content requests by the Internet Protocol address;
correlating the network traffic dataset with the content distribution network log based on the Internet Protocol address to obtain network security data;
identifying one or more threat attributes representative of malicious activity from the network security data;
weighting the one or more threat attributes; and
generating network threat intelligence based on the weighted threat attributes using a processing cluster.
2. The method of claim 1, wherein the one or more threat attributes are weighted using machine learning.
3. The method of claim 1, wherein the one or more threat attributes are weighted based on at least one of a type of activity of the malicious activity or a source reporting the malicious activity.
4. The method of claim 1, wherein the network traffic dataset and the content distribution network log are further correlated with domain name system log associated with the content distribution network based on the Internet Protocol address.
5. The method of claim 1, wherein the network traffic dataset and the content distribution network log are further correlated with other data from one or more enrichment feeds based on the Internet Protocol address.
6. The method of claim 1, wherein the network threat intelligence includes a reputation score for the Internet Protocol address.
7. The method of claim 6, the reputation score is normalized based on one or more neighborhood scores, each of corresponding to an internet neighborhood of the IP address.
8. The method of claim 7, wherein the internet neighborhood is a netblock, an autonomous system, a region, or a country.
9. The method of claim 1, wherein the network threat intelligence includes threat analytics.
10. The method of claim 9, wherein the threat analytics includes at least one of: network threat trends; maps providing visual representations of the network threats; predictions of future malicious activity; proposed responses to the network threats; or an effectiveness of responses to the network threats.
11. The method of claim 1, further comprising:
responding to a threat by the Internet Protocol address based on the network threat intelligence.
12. The method of claim 11, wherein the response includes at least one of: filtering future network traffic sent from the Internet Protocol address; null routing future network traffic associated with the threat; logically separating a malicious network associated with the Internet Protocol address; pushing data relating to the threat to firewalls on a friendly network; using Access Control List blocks; providing information regarding the Internet Protocol address to other networks for use in blocking future network traffic; publishing a list of malicious actors, including the Internet Protocol address; or not responding to a future content request by the Internet Protocol address to the content distribution network.
13. One or more non-transitory tangible computer-readable storage media storing computer-executable instructions for performing a computer process on a computing system, the computer process comprising:
extracting network traffic patterns for an Internet Protocol address from a network traffic dataset representative of network traffic for an Internet Protocol address across one or more ports of a primary network, the primary network in communication with a content distribution network, the Internet Protocol address corresponding to a computing device;
extracting a user agent for the Internet Protocol address and a history of content requests by the Internet Protocol address from a content distribution log associated with the content distribution network;
correlating the network traffic patterns with the user agent and the history of content requests to obtain network security data for the Internet Protocol address; and
generating network threat intelligence based on the network security data.
14. The one or more non-transitory tangible computer-readable storage media of claim 13, wherein the network threat intelligence includes a reputation score for the Internet Protocol address.
15. The one or more non-transitory tangible computer-readable storage media of claim 14, wherein the reputation score is generated based on one or more weighted threat attributes identified from the network security data.
16. The one or more non-transitory tangible computer-readable storage media of claim 14, wherein the reputation score is normalized based on one or more neighborhood scores, each of corresponding to an internet neighborhood of the IP address.
17. The one or more non-transitory tangible computer-readable storage media of claim 13, further comprising:
responding to a threat by the Internet Protocol address based on the network threat intelligence.
18. A system for identifying network threats, the system comprising:
a primary network in communication with a content distribution network, the primary network having one or more router interfaces through which network traffic for an Internet Protocol address is transceived, the Internet Protocol address corresponding to a computing device; and
a processing cluster configured to generate network threat intelligence based on network security data obtained from an interaction of the Internet Protocol address with the primary network and the content distribution network, the network security data including a network traffic dataset corresponding to the network traffic transceived over the one or more router interfaces for the Internet Protocol address and a content distribution log including a history of content requests from the Internet Protocol address over the primary network.
19. The system of claim 18, wherein the network threat intelligence includes a reputation score for the Internet Protocol address.
20. The system of claim 18, wherein the network threat intelligence includes a proposed response to a threat by the Internet Protocol address.
US14/683,964 2012-09-28 2015-04-10 Systems and methods for generating network threat intelligence Abandoned US20150215334A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US14/683,964 US20150215334A1 (en) 2012-09-28 2015-04-10 Systems and methods for generating network threat intelligence
CA2982107A CA2982107A1 (en) 2015-04-10 2016-04-06 Systems and methods for generating network threat intelligence
EP16777161.7A EP3281116A4 (en) 2015-04-10 2016-04-06 Systems and methods for generating network threat intelligence
PCT/US2016/026131 WO2016164403A1 (en) 2015-04-10 2016-04-06 Systems and methods for generating network threat intelligence
HK18108921.7A HK1249603A1 (en) 2015-04-10 2018-07-10 Systems and methods for generating network threat intelligence

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201261707310P 2012-09-28 2012-09-28
US14/039,251 US10129270B2 (en) 2012-09-28 2013-09-27 Apparatus, system and method for identifying and mitigating malicious network threats
US14/683,964 US20150215334A1 (en) 2012-09-28 2015-04-10 Systems and methods for generating network threat intelligence

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/039,251 Continuation-In-Part US10129270B2 (en) 2012-09-28 2013-09-27 Apparatus, system and method for identifying and mitigating malicious network threats

Publications (1)

Publication Number Publication Date
US20150215334A1 true US20150215334A1 (en) 2015-07-30

Family

ID=53680218

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/683,964 Abandoned US20150215334A1 (en) 2012-09-28 2015-04-10 Systems and methods for generating network threat intelligence

Country Status (1)

Country Link
US (1) US20150215334A1 (en)

Cited By (78)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9596256B1 (en) * 2014-07-23 2017-03-14 Lookingglass Cyber Solutions, Inc. Apparatuses, methods and systems for a cyber threat confidence rating visualization and editing user interface
US20170085580A1 (en) * 2015-09-18 2017-03-23 Telus Communications Company Protection of telecommunications networks
WO2017083436A1 (en) 2015-11-09 2017-05-18 Cyphort, Inc. System and method for detecting lateral movement and data exfiltration
US20170279773A1 (en) * 2016-03-28 2017-09-28 Juniper Networks, Inc. Dynamic prioritization of network traffic based on reputation
CN107332719A (en) * 2017-08-16 2017-11-07 北京云端智度科技有限公司 A kind of method that daily record is analyzed in real time in CDN system
WO2017196430A1 (en) * 2016-05-11 2017-11-16 Acalvio Technologies, Inc. Systems and methods for identifying similar hosts
CN107438049A (en) * 2016-05-25 2017-12-05 百度在线网络技术(北京)有限公司 A kind of malice logs in recognition methods and device
US20180063170A1 (en) * 2016-04-05 2018-03-01 Staffan Truvé Network security scoring
US20180075478A1 (en) * 2016-09-09 2018-03-15 Adam Rogas System and Method for Detecting Fraudulent Internet Traffic
CN107819783A (en) * 2017-11-27 2018-03-20 深信服科技股份有限公司 A kind of network security detection method and system based on threat information
CN108111623A (en) * 2017-12-29 2018-06-01 北京奇虎科技有限公司 A kind of communication means and device based on content distributing network CDN
US20180219912A1 (en) * 2017-01-27 2018-08-02 Level 3 Communications, Llc System and method for scrubbing dns in a telecommunications network to mitigate attacks
WO2018177167A1 (en) * 2017-04-01 2018-10-04 贵州白山云科技有限公司 Method for analyzing ip address, system, computer readable storage medium, and computer device
US20180295148A1 (en) * 2017-04-06 2018-10-11 Fortinet, Inc. Predicting the risk associated with a network flow, such as one involving an iot device, and applying an appropriate level of security inspection based thereon
US10193922B2 (en) * 2015-01-13 2019-01-29 Level 3 Communications, Llc ISP blacklist feed
US20190052662A1 (en) * 2015-06-02 2019-02-14 C3 Iot, Inc. Systems and methods for providing cybersecurity analysis based on operational technologies and information technologies
US20190095618A1 (en) * 2016-10-24 2019-03-28 Certis Cisco Security Pte Ltd Quantitative unified analytic neural networks
CN109561051A (en) * 2017-09-26 2019-04-02 中兴通讯股份有限公司 Content distributing network safety detection method and system
WO2019074547A1 (en) * 2017-10-09 2019-04-18 Level 3 Communications, Llc Predictive load mitigation and control in a content delivery network (cdn)
US10291645B1 (en) * 2018-07-09 2019-05-14 Kudu Dynamics LLC Determining maliciousness in computer networks
US20190182266A1 (en) * 2017-12-08 2019-06-13 Radware, Ltd. System and method for out of path ddos attack detection
US10326778B2 (en) 2014-02-24 2019-06-18 Cyphort Inc. System and method for detecting lateral movement and data exfiltration
US10397250B1 (en) 2016-01-21 2019-08-27 F5 Networks, Inc. Methods for detecting remote access trojan malware and devices thereof
US10432652B1 (en) 2016-09-20 2019-10-01 F5 Networks, Inc. Methods for detecting and mitigating malicious network behavior and devices thereof
CN110324327A (en) * 2019-06-20 2019-10-11 国家计算机网络与信息安全管理中心 User and server ip address caliberating device and method based on specific enterprise domain name data
CN110351280A (en) * 2019-07-15 2019-10-18 杭州安恒信息技术股份有限公司 A kind of method, system, equipment and readable storage medium storing program for executing for threatening information to extract
US10476947B1 (en) 2015-03-02 2019-11-12 F5 Networks, Inc Methods for managing web applications and devices thereof
US10552838B2 (en) 2016-09-09 2020-02-04 Ns8, Inc. System and method for evaluating fraud in online transactions
US10581902B1 (en) * 2015-11-30 2020-03-03 F5 Networks, Inc. Methods for mitigating distributed denial of service attacks and devices thereof
US10673719B2 (en) 2016-02-25 2020-06-02 Imperva, Inc. Techniques for botnet detection and member identification
US10721210B2 (en) 2016-04-22 2020-07-21 Sophos Limited Secure labeling of network flows
US10721252B2 (en) 2018-06-06 2020-07-21 Reliaquest Holdings, Llc Threat mitigation system and method
US10721243B2 (en) 2012-09-28 2020-07-21 Level 3 Communications, Llc Apparatus, system and method for identifying and mitigating malicious network threats
US10764297B2 (en) * 2017-09-15 2020-09-01 Threatmetrix Pty Ltd Anonymized persona identifier
GB2581996A (en) * 2019-03-07 2020-09-09 F Secure Corp Method of threat detection in a computer network security system
WO2020205095A1 (en) * 2019-04-01 2020-10-08 Microsoft Technology Licensing, Llc Real-time detection of malicious activity through collaborative filtering
CN111787000A (en) * 2020-06-30 2020-10-16 绿盟科技集团股份有限公司 Network security evaluation method and electronic equipment
US10834110B1 (en) 2015-12-18 2020-11-10 F5 Networks, Inc. Methods for preventing DDoS attack based on adaptive self learning of session and transport layers and devices thereof
US10924503B1 (en) * 2018-05-30 2021-02-16 Amazon Technologies, Inc. Identifying false positives in malicious domain data using network traffic data logs
US20210049302A1 (en) * 2019-08-12 2021-02-18 Bank Of America Corporation Machine learning based third party entity modeling for predictive exposure prevention
US20210092141A1 (en) * 2019-09-25 2021-03-25 Royal Bank Of Canada Systems and methods of adaptively securing network communication channels
US10965699B2 (en) * 2018-01-26 2021-03-30 Rapid7, Inc. Detecting anomalous network behavior
WO2021061526A1 (en) * 2019-09-25 2021-04-01 Level 3 Communications, Llc Network cyber-security platform
US10986109B2 (en) 2016-04-22 2021-04-20 Sophos Limited Local proxy detection
CN112714118A (en) * 2020-12-24 2021-04-27 新浪网技术(中国)有限公司 Network flow detection method and device
US11012475B2 (en) * 2018-10-26 2021-05-18 Valtix, Inc. Managing computer security services for cloud computing platforms
US11012459B2 (en) * 2015-04-17 2021-05-18 Centripetal Networks, Inc. Rule-based network-threat detection
US11038869B1 (en) 2017-05-12 2021-06-15 F5 Networks, Inc. Methods for managing a federated identity environment based on application availability and devices thereof
US20210203686A1 (en) * 2018-05-23 2021-07-01 Nippon Telegraph And Telephone Corporation Reliability calculation apparatus, reliability calculation method and program
US11070572B2 (en) * 2019-07-09 2021-07-20 Mcafee, Llc Methods, systems, articles of manufacture and apparatus for producing generic IP reputation through cross-protocol analysis
USD926200S1 (en) 2019-06-06 2021-07-27 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926782S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926810S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926809S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926811S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
US11095681B2 (en) 2018-02-28 2021-08-17 Motorola Solutions, Inc. Method to handle the distributed denial-of-service attacks 911 answering centers
US11102238B2 (en) 2016-04-22 2021-08-24 Sophos Limited Detecting triggering events for distributed denial of service attacks
US11165797B2 (en) * 2016-04-22 2021-11-02 Sophos Limited Detecting endpoint compromise based on network usage history
US11182476B2 (en) * 2016-09-07 2021-11-23 Micro Focus Llc Enhanced intelligence for a security information sharing platform
US20210377136A1 (en) * 2015-06-05 2021-12-02 Cisco Technology, Inc. System and method of assigning reputation scores to hosts
US11194905B2 (en) * 2019-04-09 2021-12-07 International Business Machines Corporation Affectedness scoring engine for cyber threat intelligence services
EP3941017A1 (en) * 2020-07-17 2022-01-19 British Telecommunications public limited company Computer-implemented security methods and systems
CN113992436A (en) * 2021-12-27 2022-01-28 北京微步在线科技有限公司 Local information generating method, device, equipment and storage medium
US11252181B2 (en) * 2015-07-02 2022-02-15 Reliaquest Holdings, Llc Threat intelligence system and method
US11277416B2 (en) * 2016-04-22 2022-03-15 Sophos Limited Labeling network flows according to source applications
US11303666B1 (en) * 2020-10-14 2022-04-12 Expel, Inc. Systems and methods for intelligent cyber security threat detection and mitigation through an extensible automated investigations and threat mitigation platform
US11349981B1 (en) 2019-10-30 2022-05-31 F5, Inc. Methods for optimizing multimedia communication and devices thereof
US11374812B2 (en) 2013-10-21 2022-06-28 Vmware, Inc. System and method for observing and controlling a programmable network via higher layer attributes
US11405410B2 (en) 2014-02-24 2022-08-02 Cyphort Inc. System and method for detecting lateral movement and data exfiltration
US11431550B2 (en) 2017-11-10 2022-08-30 Vmware, Inc. System and method for network incident remediation recommendations
US11509690B2 (en) * 2019-11-21 2022-11-22 Arbor Networks, Inc. Management of botnet attacks to a computer network
US11539740B1 (en) 2018-02-02 2022-12-27 F5, Inc. Methods for protecting CPU during DDoS attack and devices thereof
US11616806B1 (en) 2015-05-08 2023-03-28 F5, Inc. Methods for protecting web based resources from D/DoS attacks and devices thereof
US11706115B2 (en) 2016-04-18 2023-07-18 Vmware, Inc. System and method for using real-time packet data to detect and manage network issues
US11709946B2 (en) 2018-06-06 2023-07-25 Reliaquest Holdings, Llc Threat mitigation system and method
US11711393B2 (en) 2020-10-19 2023-07-25 Saudi Arabian Oil Company Methods and systems for managing website access through machine learning
US11921856B1 (en) * 2015-11-09 2024-03-05 8X8, Inc. Restricted replication for protection of replicated databases
US11936663B2 (en) 2015-06-05 2024-03-19 Cisco Technology, Inc. System for monitoring and managing datacenters

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060064740A1 (en) * 2004-09-22 2006-03-23 International Business Machines Corporation Network threat risk assessment tool
US20090138427A1 (en) * 2007-11-27 2009-05-28 Umber Systems Method and apparatus for storing data on application-level activity and other user information to enable real-time multi-dimensional reporting about user of a mobile data network
US20100211997A1 (en) * 2008-12-26 2010-08-19 Mcgeehan Ryan Authenticating user sessions based on reputation of user locations
US8220056B2 (en) * 2008-09-23 2012-07-10 Savvis, Inc. Threat management system and method
US20120311708A1 (en) * 2011-06-01 2012-12-06 Mcafee, Inc. System and method for non-signature based detection of malicious processes
US8438644B2 (en) * 2011-03-07 2013-05-07 Isight Partners, Inc. Information system security based on threat vectors
US20130254260A1 (en) * 2012-03-22 2013-09-26 Akamai Technologies Inc. Network threat assessment system with servers performing message exchange accounting
US8561187B1 (en) * 2010-09-30 2013-10-15 Webroot Inc. System and method for prosecuting dangerous IP addresses on the internet
US20130298192A1 (en) * 2012-05-01 2013-11-07 Taasera, Inc. Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms
US8806632B2 (en) * 2008-11-17 2014-08-12 Solarwinds Worldwide, Llc Systems, methods, and devices for detecting security vulnerabilities in IP networks
US8813228B2 (en) * 2012-06-29 2014-08-19 Deloitte Development Llc Collective threat intelligence gathering system
US20150207809A1 (en) * 2011-05-31 2015-07-23 Tyson Macaulay System and method for generating and refining cyber threat intelligence data
US9106680B2 (en) * 2011-06-27 2015-08-11 Mcafee, Inc. System and method for protocol fingerprinting and reputation correlation
US9148424B1 (en) * 2015-03-13 2015-09-29 Snapchat, Inc. Systems and methods for IP-based intrusion detection
US20160065597A1 (en) * 2011-07-06 2016-03-03 Nominum, Inc. System for domain reputation scoring

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060064740A1 (en) * 2004-09-22 2006-03-23 International Business Machines Corporation Network threat risk assessment tool
US20090138427A1 (en) * 2007-11-27 2009-05-28 Umber Systems Method and apparatus for storing data on application-level activity and other user information to enable real-time multi-dimensional reporting about user of a mobile data network
US8220056B2 (en) * 2008-09-23 2012-07-10 Savvis, Inc. Threat management system and method
US8806632B2 (en) * 2008-11-17 2014-08-12 Solarwinds Worldwide, Llc Systems, methods, and devices for detecting security vulnerabilities in IP networks
US20100211997A1 (en) * 2008-12-26 2010-08-19 Mcgeehan Ryan Authenticating user sessions based on reputation of user locations
US8561187B1 (en) * 2010-09-30 2013-10-15 Webroot Inc. System and method for prosecuting dangerous IP addresses on the internet
US8438644B2 (en) * 2011-03-07 2013-05-07 Isight Partners, Inc. Information system security based on threat vectors
US20150207809A1 (en) * 2011-05-31 2015-07-23 Tyson Macaulay System and method for generating and refining cyber threat intelligence data
US9118702B2 (en) * 2011-05-31 2015-08-25 Bce Inc. System and method for generating and refining cyber threat intelligence data
US20120311708A1 (en) * 2011-06-01 2012-12-06 Mcafee, Inc. System and method for non-signature based detection of malicious processes
US9106680B2 (en) * 2011-06-27 2015-08-11 Mcafee, Inc. System and method for protocol fingerprinting and reputation correlation
US20160065597A1 (en) * 2011-07-06 2016-03-03 Nominum, Inc. System for domain reputation scoring
US20130254260A1 (en) * 2012-03-22 2013-09-26 Akamai Technologies Inc. Network threat assessment system with servers performing message exchange accounting
US20130298192A1 (en) * 2012-05-01 2013-11-07 Taasera, Inc. Systems and methods for using reputation scores in network services and transactions to calculate security risks to computer systems and platforms
US9092616B2 (en) * 2012-05-01 2015-07-28 Taasera, Inc. Systems and methods for threat identification and remediation
US8813228B2 (en) * 2012-06-29 2014-08-19 Deloitte Development Llc Collective threat intelligence gathering system
US9148424B1 (en) * 2015-03-13 2015-09-29 Snapchat, Inc. Systems and methods for IP-based intrusion detection

Cited By (147)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10721243B2 (en) 2012-09-28 2020-07-21 Level 3 Communications, Llc Apparatus, system and method for identifying and mitigating malicious network threats
US11374812B2 (en) 2013-10-21 2022-06-28 Vmware, Inc. System and method for observing and controlling a programmable network via higher layer attributes
US11469947B2 (en) * 2013-10-21 2022-10-11 Vmware, Inc. System and method for observing and controlling a programmable network using cross network learning
US11469946B2 (en) 2013-10-21 2022-10-11 Vmware, Inc. System and method for observing and controlling a programmable network using time varying data collection
US11916735B2 (en) 2013-10-21 2024-02-27 VMware LLC System and method for observing and controlling a programmable network using cross network learning
US11902303B2 (en) 2014-02-24 2024-02-13 Juniper Networks, Inc. System and method for detecting lateral movement and data exfiltration
US11405410B2 (en) 2014-02-24 2022-08-02 Cyphort Inc. System and method for detecting lateral movement and data exfiltration
US10326778B2 (en) 2014-02-24 2019-06-18 Cyphort Inc. System and method for detecting lateral movement and data exfiltration
US10511621B1 (en) 2014-07-23 2019-12-17 Lookingglass Cyber Solutions, Inc. Apparatuses, methods and systems for a cyber threat confidence rating visualization and editing user interface
US9596256B1 (en) * 2014-07-23 2017-03-14 Lookingglass Cyber Solutions, Inc. Apparatuses, methods and systems for a cyber threat confidence rating visualization and editing user interface
US10193922B2 (en) * 2015-01-13 2019-01-29 Level 3 Communications, Llc ISP blacklist feed
US10516697B2 (en) 2015-01-13 2019-12-24 Level 3 Communications, Llc ISP blacklist feed
US10476947B1 (en) 2015-03-02 2019-11-12 F5 Networks, Inc Methods for managing web applications and devices thereof
US11792220B2 (en) 2015-04-17 2023-10-17 Centripetal Networks, Llc Rule-based network-threat detection
US11516241B2 (en) 2015-04-17 2022-11-29 Centripetal Networks, Inc. Rule-based network-threat detection
US20220078202A1 (en) * 2015-04-17 2022-03-10 Centripetal Networks, Inc. Rule-based network-threat detection
US11496500B2 (en) 2015-04-17 2022-11-08 Centripetal Networks, Inc. Rule-based network-threat detection
US11012459B2 (en) * 2015-04-17 2021-05-18 Centripetal Networks, Inc. Rule-based network-threat detection
US11700273B2 (en) * 2015-04-17 2023-07-11 Centripetal Networks, Llc Rule-based network-threat detection
US11616806B1 (en) 2015-05-08 2023-03-28 F5, Inc. Methods for protecting web based resources from D/DoS attacks and devices thereof
US11411977B2 (en) * 2015-06-02 2022-08-09 C3.Ai, Inc. Systems and methods for providing cybersecurity analysis based on operational technologies and information technologies
US20190052662A1 (en) * 2015-06-02 2019-02-14 C3 Iot, Inc. Systems and methods for providing cybersecurity analysis based on operational technologies and information technologies
US11924073B2 (en) * 2015-06-05 2024-03-05 Cisco Technology, Inc. System and method of assigning reputation scores to hosts
US11968102B2 (en) 2015-06-05 2024-04-23 Cisco Technology, Inc. System and method of detecting packet loss in a distributed sensor-collector architecture
US11936663B2 (en) 2015-06-05 2024-03-19 Cisco Technology, Inc. System for monitoring and managing datacenters
US20210377136A1 (en) * 2015-06-05 2021-12-02 Cisco Technology, Inc. System and method of assigning reputation scores to hosts
US11252181B2 (en) * 2015-07-02 2022-02-15 Reliaquest Holdings, Llc Threat intelligence system and method
US11418536B2 (en) 2015-07-02 2022-08-16 Reliaquest Holdings, Llc Threat intelligence system and method
US20170085580A1 (en) * 2015-09-18 2017-03-23 Telus Communications Company Protection of telecommunications networks
US10142355B2 (en) * 2015-09-18 2018-11-27 Telus Communications Inc. Protection of telecommunications networks
US11921856B1 (en) * 2015-11-09 2024-03-05 8X8, Inc. Restricted replication for protection of replicated databases
EP3374871A4 (en) * 2015-11-09 2019-04-03 Cyphort, Inc. System and method for detecting lateral movement and data exfiltration
WO2017083436A1 (en) 2015-11-09 2017-05-18 Cyphort, Inc. System and method for detecting lateral movement and data exfiltration
US10581902B1 (en) * 2015-11-30 2020-03-03 F5 Networks, Inc. Methods for mitigating distributed denial of service attacks and devices thereof
US10834110B1 (en) 2015-12-18 2020-11-10 F5 Networks, Inc. Methods for preventing DDoS attack based on adaptive self learning of session and transport layers and devices thereof
US10397250B1 (en) 2016-01-21 2019-08-27 F5 Networks, Inc. Methods for detecting remote access trojan malware and devices thereof
US10673719B2 (en) 2016-02-25 2020-06-02 Imperva, Inc. Techniques for botnet detection and member identification
US10911472B2 (en) * 2016-02-25 2021-02-02 Imperva, Inc. Techniques for targeted botnet protection
US20170279773A1 (en) * 2016-03-28 2017-09-28 Juniper Networks, Inc. Dynamic prioritization of network traffic based on reputation
US10291584B2 (en) * 2016-03-28 2019-05-14 Juniper Networks, Inc. Dynamic prioritization of network traffic based on reputation
US20180063170A1 (en) * 2016-04-05 2018-03-01 Staffan Truvé Network security scoring
US11706115B2 (en) 2016-04-18 2023-07-18 Vmware, Inc. System and method for using real-time packet data to detect and manage network issues
US10986109B2 (en) 2016-04-22 2021-04-20 Sophos Limited Local proxy detection
US10938781B2 (en) 2016-04-22 2021-03-02 Sophos Limited Secure labeling of network flows
US11165797B2 (en) * 2016-04-22 2021-11-02 Sophos Limited Detecting endpoint compromise based on network usage history
US10721210B2 (en) 2016-04-22 2020-07-21 Sophos Limited Secure labeling of network flows
US11102238B2 (en) 2016-04-22 2021-08-24 Sophos Limited Detecting triggering events for distributed denial of service attacks
US11277416B2 (en) * 2016-04-22 2022-03-15 Sophos Limited Labeling network flows according to source applications
US11843631B2 (en) 2016-04-22 2023-12-12 Sophos Limited Detecting triggering events for distributed denial of service attacks
WO2017196430A1 (en) * 2016-05-11 2017-11-16 Acalvio Technologies, Inc. Systems and methods for identifying similar hosts
CN107438049A (en) * 2016-05-25 2017-12-05 百度在线网络技术(北京)有限公司 A kind of malice logs in recognition methods and device
US11182476B2 (en) * 2016-09-07 2021-11-23 Micro Focus Llc Enhanced intelligence for a security information sharing platform
US10592922B2 (en) * 2016-09-09 2020-03-17 Ns8, Inc. System and method for detecting fraudulent internet traffic
US10552838B2 (en) 2016-09-09 2020-02-04 Ns8, Inc. System and method for evaluating fraud in online transactions
US20180075478A1 (en) * 2016-09-09 2018-03-15 Adam Rogas System and Method for Detecting Fraudulent Internet Traffic
US10432652B1 (en) 2016-09-20 2019-10-01 F5 Networks, Inc. Methods for detecting and mitigating malicious network behavior and devices thereof
US20190095618A1 (en) * 2016-10-24 2019-03-28 Certis Cisco Security Pte Ltd Quantitative unified analytic neural networks
US10691795B2 (en) * 2016-10-24 2020-06-23 Certis Cisco Security Pte Ltd Quantitative unified analytic neural networks
US20180219912A1 (en) * 2017-01-27 2018-08-02 Level 3 Communications, Llc System and method for scrubbing dns in a telecommunications network to mitigate attacks
US11012467B2 (en) * 2017-01-27 2021-05-18 Level 3 Communications, Llc System and method for scrubbing DNS in a telecommunications network to mitigate attacks
WO2018177167A1 (en) * 2017-04-01 2018-10-04 贵州白山云科技有限公司 Method for analyzing ip address, system, computer readable storage medium, and computer device
US20180295148A1 (en) * 2017-04-06 2018-10-11 Fortinet, Inc. Predicting the risk associated with a network flow, such as one involving an iot device, and applying an appropriate level of security inspection based thereon
US10785249B2 (en) * 2017-04-06 2020-09-22 Fortinet, Inc. Predicting the risk associated with a network flow, such as one involving an IoT device, and applying an appropriate level of security inspection based thereon
US11038869B1 (en) 2017-05-12 2021-06-15 F5 Networks, Inc. Methods for managing a federated identity environment based on application availability and devices thereof
CN107332719A (en) * 2017-08-16 2017-11-07 北京云端智度科技有限公司 A kind of method that daily record is analyzed in real time in CDN system
US10764297B2 (en) * 2017-09-15 2020-09-01 Threatmetrix Pty Ltd Anonymized persona identifier
CN109561051A (en) * 2017-09-26 2019-04-02 中兴通讯股份有限公司 Content distributing network safety detection method and system
US11750690B2 (en) 2017-10-09 2023-09-05 Level 3 Communications, Llc Predictive load mitigation and control in a content delivery network (CDN)
US11463512B2 (en) 2017-10-09 2022-10-04 Level 3 Communications, Llc Predictive load mitigation and control in a content delivery network (CDN)
US10523744B2 (en) 2017-10-09 2019-12-31 Level 3 Communications, Llc Predictive load mitigation and control in a content delivery network (CDN)
US10819774B2 (en) 2017-10-09 2020-10-27 Level 3 Communications, Llc Predictive load mitigation and control in a content delivery network (CDN)
WO2019074547A1 (en) * 2017-10-09 2019-04-18 Level 3 Communications, Llc Predictive load mitigation and control in a content delivery network (cdn)
US11431550B2 (en) 2017-11-10 2022-08-30 Vmware, Inc. System and method for network incident remediation recommendations
CN107819783A (en) * 2017-11-27 2018-03-20 深信服科技股份有限公司 A kind of network security detection method and system based on threat information
US20190182266A1 (en) * 2017-12-08 2019-06-13 Radware, Ltd. System and method for out of path ddos attack detection
US11632391B2 (en) * 2017-12-08 2023-04-18 Radware Ltd. System and method for out of path DDoS attack detection
CN108111623A (en) * 2017-12-29 2018-06-01 北京奇虎科技有限公司 A kind of communication means and device based on content distributing network CDN
US10965699B2 (en) * 2018-01-26 2021-03-30 Rapid7, Inc. Detecting anomalous network behavior
US11374954B1 (en) * 2018-01-26 2022-06-28 Rapid7, Inc. Detecting anomalous network behavior
US11539740B1 (en) 2018-02-02 2022-12-27 F5, Inc. Methods for protecting CPU during DDoS attack and devices thereof
US11095681B2 (en) 2018-02-28 2021-08-17 Motorola Solutions, Inc. Method to handle the distributed denial-of-service attacks 911 answering centers
US11522902B2 (en) * 2018-05-23 2022-12-06 Nippon Telegraph And Telephone Corporation Reliability calculation apparatus, reliability calculation method and program
US20210203686A1 (en) * 2018-05-23 2021-07-01 Nippon Telegraph And Telephone Corporation Reliability calculation apparatus, reliability calculation method and program
US10924503B1 (en) * 2018-05-30 2021-02-16 Amazon Technologies, Inc. Identifying false positives in malicious domain data using network traffic data logs
US10855702B2 (en) 2018-06-06 2020-12-01 Reliaquest Holdings, Llc Threat mitigation system and method
US11611577B2 (en) 2018-06-06 2023-03-21 Reliaquest Holdings, Llc Threat mitigation system and method
US11588838B2 (en) 2018-06-06 2023-02-21 Reliaquest Holdings, Llc Threat mitigation system and method
US11108798B2 (en) 2018-06-06 2021-08-31 Reliaquest Holdings, Llc Threat mitigation system and method
US11528287B2 (en) 2018-06-06 2022-12-13 Reliaquest Holdings, Llc Threat mitigation system and method
US11095673B2 (en) 2018-06-06 2021-08-17 Reliaquest Holdings, Llc Threat mitigation system and method
US11637847B2 (en) 2018-06-06 2023-04-25 Reliaquest Holdings, Llc Threat mitigation system and method
US11265338B2 (en) 2018-06-06 2022-03-01 Reliaquest Holdings, Llc Threat mitigation system and method
US11687659B2 (en) 2018-06-06 2023-06-27 Reliaquest Holdings, Llc Threat mitigation system and method
US11709946B2 (en) 2018-06-06 2023-07-25 Reliaquest Holdings, Llc Threat mitigation system and method
US11297080B2 (en) * 2018-06-06 2022-04-05 Reliaquest Holdings, Llc Threat mitigation system and method
US10965703B2 (en) 2018-06-06 2021-03-30 Reliaquest Holdings, Llc Threat mitigation system and method
US11323462B2 (en) 2018-06-06 2022-05-03 Reliaquest Holdings, Llc Threat mitigation system and method
US10951641B2 (en) 2018-06-06 2021-03-16 Reliaquest Holdings, Llc Threat mitigation system and method
US10855711B2 (en) 2018-06-06 2020-12-01 Reliaquest Holdings, Llc Threat mitigation system and method
US10848513B2 (en) 2018-06-06 2020-11-24 Reliaquest Holdings, Llc Threat mitigation system and method
US11363043B2 (en) 2018-06-06 2022-06-14 Reliaquest Holdings, Llc Threat mitigation system and method
US10848506B2 (en) 2018-06-06 2020-11-24 Reliaquest Holdings, Llc Threat mitigation system and method
US10848512B2 (en) 2018-06-06 2020-11-24 Reliaquest Holdings, Llc Threat mitigation system and method
US11374951B2 (en) 2018-06-06 2022-06-28 Reliaquest Holdings, Llc Threat mitigation system and method
US11921864B2 (en) 2018-06-06 2024-03-05 Reliaquest Holdings, Llc Threat mitigation system and method
US10735443B2 (en) 2018-06-06 2020-08-04 Reliaquest Holdings, Llc Threat mitigation system and method
US10735444B2 (en) 2018-06-06 2020-08-04 Reliaquest Holdings, Llc Threat mitigation system and method
US10721252B2 (en) 2018-06-06 2020-07-21 Reliaquest Holdings, Llc Threat mitigation system and method
US10291645B1 (en) * 2018-07-09 2019-05-14 Kudu Dynamics LLC Determining maliciousness in computer networks
US11457047B2 (en) * 2018-10-26 2022-09-27 Valtix, Inc. Managing computer security services for cloud computing platforms
US11012475B2 (en) * 2018-10-26 2021-05-18 Valtix, Inc. Managing computer security services for cloud computing platforms
GB2581996A (en) * 2019-03-07 2020-09-09 F Secure Corp Method of threat detection in a computer network security system
US11811788B2 (en) 2019-03-07 2023-11-07 WithSecure Corporation Method of threat detection in a computer network security system
GB2581996B (en) * 2019-03-07 2021-10-20 F Secure Corp Method of threat detection in a computer network security system
US11363037B2 (en) 2019-04-01 2022-06-14 Microsoft Technology Licensing, Llc. Real-time detection of malicious activity through collaborative filtering
WO2020205095A1 (en) * 2019-04-01 2020-10-08 Microsoft Technology Licensing, Llc Real-time detection of malicious activity through collaborative filtering
US11194905B2 (en) * 2019-04-09 2021-12-07 International Business Machines Corporation Affectedness scoring engine for cyber threat intelligence services
USD926810S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926809S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926782S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926200S1 (en) 2019-06-06 2021-07-27 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926811S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
CN110324327A (en) * 2019-06-20 2019-10-11 国家计算机网络与信息安全管理中心 User and server ip address caliberating device and method based on specific enterprise domain name data
US20210320934A1 (en) * 2019-07-09 2021-10-14 Mcafee, Llc Methods, systems, articles of manufacture and apparatus for producing generic ip reputation through cross protocol analysis
US11743276B2 (en) * 2019-07-09 2023-08-29 Mcafee, Llc Methods, systems, articles of manufacture and apparatus for producing generic IP reputation through cross protocol analysis
US11070572B2 (en) * 2019-07-09 2021-07-20 Mcafee, Llc Methods, systems, articles of manufacture and apparatus for producing generic IP reputation through cross-protocol analysis
CN110351280A (en) * 2019-07-15 2019-10-18 杭州安恒信息技术股份有限公司 A kind of method, system, equipment and readable storage medium storing program for executing for threatening information to extract
US11461497B2 (en) * 2019-08-12 2022-10-04 Bank Of America Corporation Machine learning based third party entity modeling for predictive exposure prevention
US20210049302A1 (en) * 2019-08-12 2021-02-18 Bank Of America Corporation Machine learning based third party entity modeling for predictive exposure prevention
WO2021061526A1 (en) * 2019-09-25 2021-04-01 Level 3 Communications, Llc Network cyber-security platform
US11706628B2 (en) 2019-09-25 2023-07-18 Level 3 Communications, Llc Network cyber-security platform
US20230231869A1 (en) * 2019-09-25 2023-07-20 Royal Bank Of Canada Systems and methods of adaptively securing network communication channels
US11627153B2 (en) * 2019-09-25 2023-04-11 Royal Bank Of Canada Systems and methods of adaptively securing network communication channels
US20210092141A1 (en) * 2019-09-25 2021-03-25 Royal Bank Of Canada Systems and methods of adaptively securing network communication channels
US11337076B2 (en) 2019-09-25 2022-05-17 Level 3 Communications, Llc Network cyber-security platform
US11349981B1 (en) 2019-10-30 2022-05-31 F5, Inc. Methods for optimizing multimedia communication and devices thereof
US11509690B2 (en) * 2019-11-21 2022-11-22 Arbor Networks, Inc. Management of botnet attacks to a computer network
CN111787000A (en) * 2020-06-30 2020-10-16 绿盟科技集团股份有限公司 Network security evaluation method and electronic equipment
EP3941017A1 (en) * 2020-07-17 2022-01-19 British Telecommunications public limited company Computer-implemented security methods and systems
US11856029B2 (en) 2020-07-17 2023-12-26 British Telecommunications Public Limited Company Computer-implemented security methods and systems
GB2597909A (en) * 2020-07-17 2022-02-16 British Telecomm Computer-implemented security methods and systems
GB2597909B (en) * 2020-07-17 2022-09-07 British Telecomm Computer-implemented security methods and systems
US11658999B2 (en) 2020-10-14 2023-05-23 Expel, Inc. Systems and methods for intelligent cyber security threat detection and mitigation through an extensible automated investigations and threat mitigation platform
US11303666B1 (en) * 2020-10-14 2022-04-12 Expel, Inc. Systems and methods for intelligent cyber security threat detection and mitigation through an extensible automated investigations and threat mitigation platform
US11711393B2 (en) 2020-10-19 2023-07-25 Saudi Arabian Oil Company Methods and systems for managing website access through machine learning
CN112714118A (en) * 2020-12-24 2021-04-27 新浪网技术(中国)有限公司 Network flow detection method and device
CN113992436A (en) * 2021-12-27 2022-01-28 北京微步在线科技有限公司 Local information generating method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US20150215334A1 (en) Systems and methods for generating network threat intelligence
US10721243B2 (en) Apparatus, system and method for identifying and mitigating malicious network threats
US10887330B2 (en) Data surveillance for privileged assets based on threat streams
CA2982107A1 (en) Systems and methods for generating network threat intelligence
US9860265B2 (en) System and method for identifying exploitable weak points in a network
CN111193719A (en) Network intrusion protection system
US10079843B2 (en) Streaming method and system for processing network metadata
US9942270B2 (en) Database deception in directory services
US9781157B1 (en) Mitigating denial of service attacks
Patel et al. An intrusion detection and prevention system in cloud computing: A systematic review
US20180041521A1 (en) Malware domain detection using passive dns
JP2021507375A (en) Context risk monitoring
JP2014519751A (en) Using DNS communication to filter domain names
US8713674B1 (en) Systems and methods for excluding undesirable network transactions
ur Rasool et al. A survey of link flooding attacks in software defined network ecosystems
Alparslan et al. BotNet detection: Enhancing analysis by using data mining techniques
Singh et al. An extensive vulnerability assessment and countermeasures in open network operating system software defined networking controller
EP4044505B1 (en) Detecting botnets
Subramani et al. Detecting and measuring in-the-wild DRDoS attacks at IXPs
Roponena et al. Towards a Human-in-the-Loop Intelligent Intrusion Detection System.
Singh et al. A Comprehensive Survey on DDoS Attacks Detection & Mitigation in SDN-IoT Network
US20240064158A1 (en) Automatic threat actor attribution based on multiple evidence
Selvaraj et al. Enhancing intrusion detection system performance using firecol protection services based honeypot system
US20230370479A1 (en) Automatic generation of attack patterns for threat detection
US20220210184A1 (en) Batch clustering of online attack narratives for botnet detection

Legal Events

Date Code Title Description
AS Assignment

Owner name: LEVEL 3 COMMUNICATIONS, LLC, COLORADO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BINGHAM, SKYLER J.;CHANDRAKAR, MAHENDRA K.;GOWIN, LAWRENCE W.;AND OTHERS;SIGNING DATES FROM 20150406 TO 20150409;REEL/FRAME:035384/0725

STCV Information on status: appeal procedure

Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION